Now that threat hunting is recognized as an official discipline by NIST, Secureworks explains what that means for companies who want to implement threat hunting, supplement their own programs, or partner with others. Read More
This series of challenges required capture-the-flag (CTF) participants to use proxy logs, social media, and public services as they explored the compromise of a fictitious music promotion company. Read More
The capture-the-flag (CTF) competition at the Threat Intelligence Summit challenged participants in areas such as forensics, malware analysis, and threat intelligence. Read More
Combining the specialized skills from Secureworks® Incident Response and Adversarial Security Testing in a single engagement delivers results that supersede traditional delivery models. Read More
This evolving and brutally effective threat can have a significant impact on an organization’s resources, finances, and reputation, but it can be stopped Read More
The likely China-based targeted threat group has been active since at least 2017, using a combination of custom and native tools to steal data from its targets Read More
The goals of sharing these profiles are to provide insight into CTU characterizations, encourage feedback, and promote discussions within the security community. Read More