Attivo Networks Blogs

Uncategorized

SolarWinds Supply Chain Attack: Automating Incident Response to Detect Lateral Movement

Reading Time: 4 minutes  |  Published: December 15, 2020 in Blogs, Cyber Breach, Uncategorized
0 Comments

Author: Attivo Research Team - SolarWinds issued an advisory on 13 December 2020 informing users of a sophisticated attack on its Orion Platform, an application that monitors and manages IT environments. FireEye analyzed the SolarWinds Orion Platform code compromise (dubbed SUNBURST) and shared further post-analysis details...

Attivo Networks one of the first partners of the McAfee Security Innovation Alliance SIA

Reading Time: < 1 minute  |  Published: November 23, 2020 in Attivo News, Uncategorized
0 Comments

Attivo Networks is one of the first partners of the McAfee Security Innovation Alliance (SIA) to be included in the newly launched McAfee MVISION Marketplace. The Marketplace is an open, cloud-based platform that allows customers to quickly and easily procure solutions from McAfee and partners to...

Attivo Networks: Deception technology against ransomware

Reading Time: < 1 minute  |  Published: September 28, 2020 in Attivo News, Uncategorized
0 Comments

Firewalls and classic solutions for endpoint security are not enough to defend against increasingly sophisticated and targeted attacks against IT infrastructure and applications, warn the security specialists at Attivo Networks. Although this combination would offer a certain level of protection against common and simple malware...

Customers Asked for CrowdStrike Integrations, so We Delivered

Reading Time: 3 minutes  |  Published: July 14, 2020 in Blogs, Incident Response, Partner, Uncategorized
0 Comments

Written by: Joseph Salazar, Technical Marketing Engineer - Attivo Networks actively solicits feedback from its customers for improvements and new features they want to see.  We regularly receive requests to integrate with particular technology solutions that allow customers to better leverage the Attivo ThreatDefend® platform...

12 Days of Cybersecurity Christmas

Reading Time: 2 minutes  |  Published: December 24, 2019 in Uncategorized
0 Comments

On the first day of Christmas a cyber attacker sent to meA Trojan to access my PC On the second day of Christmas a cyber attacker sent to meTwo root hole exploitsAnd Trojan to access my PC On the third day of Christmas a cyber attacker sent...