Category: Security Operations

Providing Solutions

Rapid Response: The Ngrok Incident Guide

Ngrok is a legitimate remote-access tool. It is regularly abused by attackers, who use its capabilities and reputation to maneuver while bypassing network protections. This incident guide shows Security Operations Centers (SOCs) and response teams how to detect and respond to the suspicious presence or use of ngrok on the network.

Confluence exploits used to drop ransomware on vulnerable servers

Automated attacks are now widely exploiting the Atlassian vulnerability

Telerik UI exploitation leads to cryptominer, Cobalt Strike infections

Attacker targets bugs in a popular web application graphical interface development tool

Move fast, unbreak things: About the Sophos Active Adversary Playbook 2022

Our latest report shows that the most pleasant way to learn from Rapid Response mayhem is to read about how it worked out for someone else