Detecting Alternative Command and Control Communication Channels in Endpoint Data (Screenshot Demo)
Our latest demo looks at the Digital Guardian endpoint agent’s ability to detect stealthy malware C&C communications designed to evade detection by network security tools.
Sticky Fingers via Sticky Keys: A Quest for Data Exfil (Screenshot Demo)
VP of Cybersecurity Tim Bandos presents the discovery, analysis, and mitigation of a Sticky Key attack in the latest from DG ATAC - our Advanced Threat and Analysis Center.
What a script! Detecting and analyzing a Flash drive-by attack (Screenshot Demo)
Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
Detecting and Analyzing Locky Ransomware with Digital Guardian (Screenshot Demo)
A wave of ransomware attacks targeting businesses has been making headlines lately – here’s what a typical Locky ransomware infection looks like and how these attacks can be detected.
Detecting CryptoWall 3.0 Using Real Time Event Correlation
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.