Stamus Networks Blog

We believe that sharing information is necessary to improve global security. The purpose of this blog is to share our experiences, perspectives and experiments.

Subscribe to our Blog

Blog /
Showing 40 results
of 40 items.
Reset All

Category

5 Questions to Ask Before Renewing Your NDR Solution

In today's rapidly evolving threat landscape, network detection and response (NDR) solutions play a...

The Hidden Costs of Anomaly-Only Detection & Response Systems

In recent years, AI-based anomaly detection has become a cornerstone of network security marketing....

Beyond the Black Box: Why Transparency Matters in Network Detection

In today's complex threat landscape, cybersecurity teams face an overwhelming challenge: detecting...

Uncovered: Clear NDR Discovers Critical Non-Compliance at European Bank

For many organizations considering Network Detection and Response (NDR), one of the most valuable...

Why SOC Teams are Switching from Darktrace to Clear NDR

In recent years, we've observed a notable trend: sophisticated security operations centers (SOCs)...

Stamus Networks at Forum InCyber – See Clear NDR in Action!

Stamus Networks will be exhibiting Forum InCyber, one of Europe’s leading cybersecurity events,...

Dramatically Reduce MTTD & MTTR: 2 Clicks to Evidence with Clear NDR™

This blog post details how Clear NDR drastically reduces Mean Time to Detect (MTTD) and Mean Time...

Feature Spotlight: Contextual Deep Linking

Analysts in a SOC use many different tools on a daily basis. When hunting for security incidents,...

Feature Spotlight: Attack Surface Inventory

As all cybersecurity defenders know, visibility into the network is the key to understanding what...

Feature Spotlight: Declarations of Policy Violation™

One of the new, exciting innovations available with the release ofClear NDRTM U40 is the inclusion...

Uncovered with Clear NDR: Lateral Active Exploits

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: DarkGate Malware as a Service (MaaS)

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: High Entropy Domain Connections

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Introducing Open NRD: Newly Registered Domain Threat Intel Feeds for Suricata

This article describes the details of the new Open NRD threat intelligence feeds provided by Stamus...

Threat Hunting for Unknown Actors & Threats using NRD and Sightings

This week’s guided threat hunting blog focuses on hunting for high-entropy NRD (newly registered...

Feature Spotlight: Declarations of Compromise™

One of the unique innovations in Clear NDRTM is the feature known as Declaration of Compromise™...

The Hidden Risks of False Positives: How to Prevent Alert Fatigue in Your Organization

Intrusion Detection Systems (IDS) can be powerful threat detection tools, but IDS users frequently...

Hunting for Suspicious DNS Use During Policy Verification

This week’s guided threat hunting blog focuses on verifying a policy enforcement of domain...

Hunting for Lateral Executable Transfers

It is not uncommon to see executable file transfers within an organization. However, it is...

Hunting for Punycode Domain Phishing

Punycode domains have traditionally been used by malware actors in phishing campaigns. These...

Hunting for Suspicious DNS Requests with Long Domain Extensions

When you see a domain request from a user/client to a non-local or otherwise unfamiliar or...

Hunting for Suspicious DNS Requests with Short Domain Extensions

Non-local domain requests from the user/client network could signal trouble for an organization....

Hunting for the use of DNS Over HTTPS

DNS over HTTPS (DoH) is a network protocol designed to enhance user privacy by encrypting DNS...

Hunting for Plain Text Executables with Stamus Security Platform

Plain text executables (such as those downloaded from a PowerShell user agent) are often seen on...

Hunting for Internal Use of Dynamic DNS with Stamus Security Platform

This week in our series on guided threat hunting, we are focusing on locating internal use of...

Hunting for Use of Foreign Domain Infrastructure with Stamus Security Platform

This week’s guided threat hunting blog focuses on hunting for foreign domain infrastructure usage...

Hunting for Unauthorized Activity from Critical Infrastructure

This week’s guided threat hunting blog focuses on hunting for Let’s encrypt certificates that were...

Hunting for Unauthorized Admin User Activity with Stamus Security Platform

In this week’s guided threat hunting blog, we will focus on hunting for Let’s Encrypt certificates...

Hunting for Rogue Proxy Servers

In this week’s guided threat hunting blog, we focus on using Clear NDR to identify rogue proxy...

Hunting for Phishing Activity with Stamus Security Platform

In this week’s guided threat hunting blog, we focus on using Clear NDR to uncover phishing...

Uncovered with Clear NDR: Raiz0WorM

In this series of articles we share hands-on experience from active hunts in the real world. We...

Uncovered with Clear NDR: Spyware Missed by EDR

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: Danger in the Datacenter

When the blue team needs to mount a network defense, they must answer some very common questions:

  • ...

Uncovered with Clear NDR: User Agents Tell the Story

Clear NDRTM helps bank identify threat to its accounting network

With the help of the Clear NDR, ...

Uncovered with Clear NDR: Shadow IT

In this series of articles, we explore a set of use cases that we have encountered in real-world...

Uncovered with Clear NDR: MoDi RAT

In this series of articles, we will explore a set of use cases that we have encountered in...