4 min read
Red CryptoApp: A New Threat Group in the Ransomware World
This is a preliminary report based only on the data leak site (DLS), listed victims, and other observed patterns. A detailed investigation will...
Read More4 min read
This is a preliminary report based only on the data leak site (DLS), listed victims, and other observed patterns. A detailed investigation will...
Read More1 min read
As the first, exclusive pure-play Google Chronicle SecOps partner, Netenrich is 100% committed to the Chronicle SecOps and Mandiant technology...
5 min read
This article focuses on my research to uncoverthe identity of Hunters International ransomware group’s (Surface Web) Dedicated Leak Site (DLS). It...
4 min read
Alpha ransomware, a distinct group not to be confused with ALPHV ransomware, has recently emerged with the launch of its Dedicated/Data Leak Site...
1 min read
Visit Netenrich at booth #4424 in Moscone North Expo during RSAC in San Francisco on May 6 – 9, 2024, and learn how we are redefining MDR services,...
3 min read
As rising digital connectivity expands the cyber risk plane in 2024, threat actors continue co-opting innovations to pioneer more virulent extortion...
4 min read
So, what’s a SOC? Some still believe they need a physical SOC building, where they can see, touch, and manage servers. Others feel it’s necessaryto...
1 min read
In the ever-evolving landscape of cyber threats, it's not surprising that organizations are expanding their cybersecurity budgets to fortify their...
8 min read
This article is not an in-depth reverse-engineering analysis of a ransomware variant. Rather, it discusses the methods and different techniques...
3 min read
Beaconing attacks can be difficult—but not impossible—to detect. The more you know about these stealthy attacks, the better you’ll be able to...
The best source of information for Security, Networks, Cloud, and ITOps best practices. Join us.