A Pragmatic Approach to Threat Hunting
A discussion of best practices and methodologies. Most companies believe they are prepared to detect, respond to, and contain an advanced threat. However, are we prepared for hunting and implementing proactive response methodologies for artifacts that cyber attack groups use?
Review the rThreat datasheet to learn more about our platform
Features and scope of rThreat.
Read Our Blog
rThreat Adversary Spotlight: Lockfile Ransomware
Learn more about the Lockfile Ransomware and how to better safeguard your Windows Exchange servers with rThreat.
Tips for Implementing Continuous Security Validation
It can be challenging to know how to be proactive with your cybersecurity. Learn tips for continuous security validation.
rThreat Adversary Spotlight: Chaos Ransomware
Chaos Malware, also known as Ryuk.net Ransomware Builder is a relatively new ransomware that is still being developed and explored. Ransomware continues to be one of the most popular threat vectors for hackers and is probably the most profitable type of cyberattack...