Iranian Cyber Threats – X

[vc_row type=”full_width_background” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”40″ bottom_padding=”20″ overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][vc_column_text]

Iranian Cyber Threats

[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-3″][image_with_animation image_url=”7445″ alignment=”right” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%” img_link=”https://redtridentinc.com/wp-content/uploads/2020/01/RTI-Brochure-RTI-services.pdf”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”3/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-9″][vc_column_text]

Traditional cyber defense approaches aren’t working.

[/vc_column_text][vc_column_text]Even organizations with elite cybersecurity programs don’t have the visibility into incoming threats or the response capabilities they need. With a collective defense approach, threats are detected by one and blocked by all. As a member of a collective defense “dome,” you benefit from the threats that are detected, scored and shared real-time.[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-3″][image_with_animation image_url=”7445″ alignment=”right” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%” img_link=”https://redtridentinc.com/wp-content/uploads/2020/01/RTI-Brochure-RTI-services.pdf”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”3/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-9″][vc_column_text]

Detecting Post-Click Phishing Through Network Behaviors

[/vc_column_text][vc_column_text]No phishing prevention system works 100% of the time. More and more, corporations rely on employees to use their best judgement to identify and report phishing attempts. Unfortunately, increased security awareness training and other forms of education only go so far. Inevitably, a user will fall victim to a phishing attack.[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-3″][image_with_animation image_url=”7445″ alignment=”right” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%” img_link=”https://redtridentinc.com/wp-content/uploads/2020/01/RTI-Brochure-RTI-services.pdf”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”3/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-9″][vc_column_text]

Adventures in Systemd Injection

[/vc_column_text][vc_column_text]

Defending against advanced threats require a team of skilled offensive cyber operators who find novel ways to bypass security controls and skilled defensive operators to translate those insights into techniques.

[/vc_column_text][/vc_column][/vc_row][vc_row type=”full_width_background” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” top_padding=”4%” overlay_strength=”0.3″ shape_divider_position=”bottom” shape_type=””][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-3″][image_with_animation image_url=”7445″ alignment=”right” animation=”Fade In” border_radius=”none” box_shadow=”none” max_width=”100%” img_link=”https://redtridentinc.com/wp-content/uploads/2020/01/RTI-Brochure-RTI-services.pdf”][/vc_column][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”3/4″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid” offset=”vc_col-xs-9″][vc_column_text]

Two Years Later: NotPetya’s Lessons for Cybersecurity Continue

[/vc_column_text][vc_column_text]

In early Summer 2017, the highly destructive NotPetya malware appeared and spread with devastating efficiency across information systems and architectures worldwide. The attack not only broke records for speed and destruction, but also served as a wakeup call for security professionals to up their game on cyber defense. Let’s take a closer look at important lessons of NotPetya, and how those lessons continue to shape today’s leading practices in cybersecurity.

[/vc_column_text][/vc_column][/vc_row][vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″ shape_divider_position=”bottom”][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ column_shadow=”none” column_border_radius=”none” width=”1/1″ tablet_text_alignment=”default” phone_text_alignment=”default” column_border_width=”none” column_border_style=”solid”][divider line_type=”No Line” custom_height=”40″][/vc_column][/vc_row]

Scroll to Top