A Pragmatic Approach to Threat Hunting
A discussion of best practices and methodologies. Most companies believe they are prepared to detect, respond to, and contain an advanced threat. However, are we prepared for hunting and implementing proactive response methodologies for artifacts that cyber attack groups use?
Review the rThreat datasheet to learn more about our platform
Features and scope of rThreat.
Read Our Blog
With K-12 schools transitioning to remote learning, cyberattacks have been on the rise leaving students, faculty, and staff in a vulnerable state.
In our last blog article, we discussed the rise of cyber attacks targeting the manufacturing sector. As legacy systems get updated for the modern age, industrial equipment and other control systems that were never designed to connect to the Internet are now vulnerable...
For companies in the manufacturing industry, ransomware attacks have become a pervasive threat. Since many manufacturers are unable to remain locked out of their operational technology (OT) networks, hackers are targeting them with ransomware. During a...