Are your defenses Kenough? 🎂 In honor of Ryan Gosling's birthday, we're unboxing some of the year’s most prevalent cyberthreats, with detection and prevention guidance from Barbie’s boyfriend. https://lnkd.in/eWy24iAJ
Red Canary
Computer and Network Security
Denver, Colorado 63,124 followers
24/7/365 threat detection and response across your cloud, identity, endpoints and everything in-between. We got you.
About us
Red Canary stops cyber threats no one else does, so organizations can fearlessly pursue their missions. Security leaders all share one goal: ‘Don’t get breached.’ Since day one at Red Canary, enterprises have relied on us to find and stop threats before they can cause harm. The most sophisticated security teams trust us for our intelligence-led Security Operations platform run by world-class security experts. We manage, detect and respond to prevalent threats across cloud, identity and endpoint so you can have more time to focus on business-specific specific security needs and requirements. We got you.
- Website
-
https://redcanary.com/
External link for Red Canary
- Industry
- Computer and Network Security
- Company size
- 201-500 employees
- Headquarters
- Denver, Colorado
- Type
- Privately Held
- Founded
- 2013
- Specialties
- Threat Detection, Endpoint Detection & Response, Endpoint Security, Managed Security, Threat Hunting, Digital Forensics & Incident Response, Managed Detection and Response, and Managed Detection & Response
Locations
-
Primary
1601 19th St
Denver, Colorado 80202, US
Employees at Red Canary
Updates
-
🍂🍁 As the leaves change, so do the threats we face 🍁🍂 Dive into Atomic Stealer, a new cyber threat aimed at exfiltrating sensitive data. Understand how this stealthy malware works, how it targets Apple devices, and, most importantly, what steps you can take to detect it early. Don't let your guard fall with the season! Read more: https://lnkd.in/eM7KuCAM
-
🌟 November is here, and it’s the perfect time for gratitude! Thank you to our customers for your feedback on G2 and for helping us become a Leader. Your trust means everything to us! https://lnkd.in/ebFJPwUs
-
🤖 New research on GenAI tradecraft: Adversaries can compromise key material in Azure OpenAI to host malicious models, poison trained models, and steal intellectual property. Read our blog detailing how they do it and what to look for in the logs. https://lnkd.in/eY_cJHBU
-
"Be the difference." 💛 We’re inspired by Marquette University's tagline and ready to bring it to life next week at their TechLeaders Forum! We’ll dive into careers, cybersecurity, and empowering women in tech: 🎤 A panel moderated by Marquette's CIO Laurie Panella, featuring Red Canary's president Katie Bullard and security leaders from Microsoft, Children’s Hospital of Wisconsin, and Epiq. 💻 As part of the event, Red Canary is proud to donate laptops to Marquette University's Educational Opportunity Program (EOP), which helps first-generation and underrepresented students succeed in higher education. Wisconsinites, register for this special event here: https://lnkd.in/g9VvpGcw.
-
This Halloween, beware of Frankenstein's monster…in your network! 🎃 This oldie but goodie blog unearths a ghoulish threat: the copy/paste cryptominer. Pieced together from open source code and stitched up with various tools, this crafty malware sneaks in with the finesse of a mad scientist. No bolts in the neck, just clever copy-paste techniques that could drain your resources before you even spot it! 🧟♂️ Find out how to identify and defeat this cobbled-together creature lurking in the shadows. Read the full story... if you dare 👻: https://lnkd.in/gbm_v2q7
Frankenstein was a hack: the copy/paste cryptominer
redcanary.com
-
It’s not too late to get ahead of 2024’s biggest threats! Red Canary experts explore the latest in identity abuse and cloud attacks & offer up key defense strategies. 🎥 WATCH NOW: https://lnkd.in/ev6a4WhK
2024’s most impactful threats: Identity abuse, cloud attacks & more
https://www.youtube.com/
-
The latest edition of Red Canary's Intelligence Insights is out! ChromeLoader and SocGholish maintained their 1st and 2nd place spots respectively among this month's top 10 most prevalent threats, several familiar faces returned to the list, and adversaries are delivering LummaC2 by tricking users into copying a PowerShell script from a pop-up message, pasting it into the Windows Run dialogue box, and executing malicious PowerShell code.
Intelligence Insights: October 2024
redcanary.com
-
Missed day one of MITRE ATT&CK's #attackcon? You can now watch Brian Donohue and Alexandrea B.’s talk challenging traditional industry threat prevalence analysis on-demand: https://lnkd.in/er9Xb6ub
-
🚨 Ransomware through supply chains? Learn how attackers target trusted providers to hit multiple businesses at once. WATCH NOW: https://lnkd.in/gUMu5GmB
How supply chain attacks spread ransomware
https://www.youtube.com/