Posts about Blog

Collaborative Defence: Integrating Microsoft Defender with other Security Tools

Intro

Following on from our blog: From Phishing to Worms: A Deep Dive into Microsoft Defender’s Detection. In today’s ever-evolving landscape of cybersecurity, having robust investigative capabilities is of paramount importance for businesses to swiftly detect, respond to, and mitigate threats effectively. Microsoft Defender for Endpoint, a cutting-edge Endpoint Detection and Response (EDR) solution, plays a pivotal part in equipping security...

From Phishing to Worms: A Deep Dive into Microsoft Defender’s Detection

Intro

In the rapidly evolving cybersecurity landscape, having robust investigative capabilities is...

Brute Force Attack of an Executive User

Cyberseer deploys advanced threat detection solutions as part of its managed security services...

Employee Data Theft

After a quick browse of cybersecurity headlines, any reader would quickly see the sheer volume of...

XDR - What is the benefit?

How Cyberseer Detect Burp Suite using Darktrace

Burp Suite is a graphical tool for testing Web application security and vulnerabilities that can be...

Mapping Compromised Insider to MITRE ATT&CK Techniques

If this is one of your use cases, Cyberseer would work with your environment to ensure we have the...

Detect Emotet Malspam

Introduction to Emotet Malspam

Recently, one of Cyberseer’s customers was hit with a “Malspam”...

Cyberseer Threat Intelligence Report

Keeping your business safe is your number one priority. It's ours too.

Fusing advanced threat...

Cyberseer Annual Review & 2020 Cybersecurity Trends

2020 was a year to remember for all the wrong reasons. Organisations were forced to immediately...

Sign up to receive Cyberseer blogs directly to your inbox: