Detecting Alternative Command and Control Communication Channels in Endpoint Data (Screenshot Demo)
Our latest demo looks at the Digital Guardian endpoint agent’s ability to detect stealthy malware C&C communications designed to evade detection by network security tools.
Sticky Fingers via Sticky Keys: A Quest for Data Exfil (Screenshot Demo)
VP of Cybersecurity Tim Bandos presents the discovery, analysis, and mitigation of a Sticky Key attack in the latest from DG ATAC - our Advanced Threat and Analysis Center.
What a script! Detecting and analyzing a Flash drive-by attack (Screenshot Demo)
Flash drive-by downloads and malvertising continue to be common attack vectors for malware infections. Here's a look at how these attacks can be detected and stopped based on behavioral characteristics.
Detecting and Analyzing Locky Ransomware with Digital Guardian (Screenshot Demo)
A wave of ransomware attacks targeting businesses has been making headlines lately – here’s what a typical Locky ransomware infection looks like and how these attacks can be detected.
Detecting CryptoWall 3.0 Using Real Time Event Correlation
Today we’re sharing a use case from the DG Lab in which we detected a variant of the CryptoWall 3.0 ransomware by correlating indicators of compromise within system process calls in real time.
Sign Up For Updates
Thank you for subscribing!