Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 22 results
of 22 items.
Reset All

Category

Uncovered: Real-Time Policy Violation Detection in a Zero Trust Environment

Modern IT infrastructure, whether traditional or hybrid, faces persistent challenges: staff...

Uncovered: Uncovering Risk Exposure from Publicly Accessible Unauthenticated TFTP

One of the significant advantages of Clear NDR’s multi-layered detection is its ability to identify...

Production Ready Suricata Language Server (SLS) 1.0 is now Available

Suricata Language Server (SLS) has been available for more than 3 years, and it has always been...

Uncovered: Uncovering Misconfigured Devices & Applications with Clear NDR

The example outlined in this blog article demonstrates Clear NDR’s value in delivering visibility...

Uncovered: Detecting Misconfigured Web Server via Unstructured Hunting in Clear NDR

The following example is of an unstructured hunt technique—an investigation based on an idea or...

Introducing Clear NDR™

At Stamus Networks, we have always been driven by a commitment to openness, transparency, and...

Uncovered with Clear NDR: Tapped on the Shoulder

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Demystifying the Cyber Kill Chain: Understanding the Stages of a Cyber Attack

The cyber kill chain is a widely-used framework for tracking the stages of a cyber attack on an...

Stop the leak! Detecting ChatGPT used as a channel for data exfiltration

In a recent conversation, one of our customers shared their concerns about the use of ChatGPT in...

Detecting Attacks Against CVE-2022-39952 (FortiNAC)

This blog describes the steps Stamus Networks customers may take to determine if any of your...

Threats! What Threats? Penetration Tests and Clear NDR

This week in our threat detection blog we are mixing things up and discussing an important  Clear...

Threats! What Threats? Combatting Remote Access Trojans with Clear NDR

This week’s threat detection blog dives deeper into a common type of malware, remote access trojans...

Hunting for Unauthorized FTP Usage

This week’s guided threat hunting blog focuses on a specific policy violation - the use of...

Threats! What Threats? Detecting Phishing with Clear NDR

Phishing is commonly regarded as the most common and effective way attackers can gain access into a...

Threats! What Threats? Command & Control and Clear NDR

In this article, we will review one of the most important and critical  phases on the cyber kill...

Threats! What Threats? Malware Beacons and Clear NDR

One of the first network-related indications of a botnet or peer-to-peer (P2P) malware infection is...

Threats! What Threats? Detecting Lateral Movement with Clear NDR

In this article I want to highlight one of the tactics used by malicious actors to move within your...