Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 9 results
of 9 items.
Reset All

Category

Uncovered: Real-Time Policy Violation Detection in a Zero Trust Environment

Modern IT infrastructure, whether traditional or hybrid, faces persistent challenges: staff...

Uncovered: Uncovering Risk Exposure from Publicly Accessible Unauthenticated TFTP

One of the significant advantages of Clear NDR’s multi-layered detection is its ability to identify...

Production Ready Suricata Language Server (SLS) 1.0 is now Available

Suricata Language Server (SLS) has been available for more than 3 years, and it has always been...

Uncovered: Uncovering Misconfigured Devices & Applications with Clear NDR

The example outlined in this blog article demonstrates Clear NDR’s value in delivering visibility...

Uncovered: Detecting Misconfigured Web Server via Unstructured Hunting in Clear NDR

The following example is of an unstructured hunt technique—an investigation based on an idea or...

Introducing Clear NDR™

At Stamus Networks, we have always been driven by a commitment to openness, transparency, and...

Demystifying the Cyber Kill Chain: Understanding the Stages of a Cyber Attack

The cyber kill chain is a widely-used framework for tracking the stages of a cyber attack on an...

Hunting for Unauthorized FTP Usage

This week’s guided threat hunting blog focuses on a specific policy violation - the use of...