Why Compromise Assessment Should Be a Part of Your Threat Detection and Response Ecosystem
Why Compromise Assessment Should Be a Part of Your Threat Detection and Response Ecosystem

Why Compromise Assessment Should Be a Part of Your Threat Detection and Response Ecosystem

A typical compromise assessment plan uses specialized software and scripts combined with forensic data to find compromises or problems that were not previously discovered. It is frequently used to find security holes and detect all known malware types as well as remote access tools.

Read More

The Evolution of SideWinder APT and their Modus-Operandi

A suspected Indian threat actor group, Sidewinder, has been operating at least since 2012. They have been seen attacking businesses, military, and governmental institutions across Asia, particularly in Pakistan, China, Nepal, and Afghanistan. However, Pakistan has been the main focus of SideWinder since the group was discovered in 2012.
Read More

An overview of FIN11 and their motivations

A financially driven threat group FIN11 has run some of the most extensive and longest-running malware dissemination campaigns. Researchers have noted to date among financially motivated threat actors. In addition to their prolific malicious email operations, FIN11 is noteworthy for its ongoing development of malware delivery strategies.
Read More


CONTACT US

We welcome you to contact us for more information
about HAWKEYE - SOC As A Service.