Red Canary
5.61K subscribers
4:11
The difference between Scarlet Goldfinch & SocGholish | Red Canary Threat Intelligence
Red Canary
101 views • 1 day ago
1:57
Stay vigilant against ransomware precursors | Red Canary Threat Intelligence
Red Canary
98 views • 4 days ago
3:05
3 things to consider when buying EDR | Red Canary
Red Canary
161 views • 2 weeks ago
1:32
Top threats leveraging NetSupport Manager | Red Canary Threat Intelligence
Red Canary
93 views • 4 weeks ago
45:09
Optimize your SOC with product management & intelligence-led strategies | Red Canary
Red Canary
186 views • 1 month ago
58:23
Detecting and responding to stealer malware in 2024 | Red Canary
Red Canary
569 views • 1 month ago
52:41
The Detection Series: Windows Management Instrumentation (Part 2) | Red Canary
Red Canary
222 views • 1 month ago
28:28
The Detection Series: Windows Management Instrumentation (Part 1) | Red Canary
Red Canary
335 views • 1 month ago
1:02:24
The Detection Series: Installer packages | Red Canary
Red Canary
292 views • 1 month ago
2:08
How adversaries use SEO poisoning to serve up malware | Red Canary
Red Canary
185 views • 1 month ago
39:56
Establishing an effective response capability | Red Canary
Red Canary
142 views • 2 months ago
1:31
SocGholish malware dominates April threat landscape | Red Canary Threat Intelligence
Red Canary
166 views • 2 months ago
48:35
Overcoming cloud security challenges | Red Canary
Red Canary
144 views • 2 months ago
44:56
Identify and address multicloud challenges | Red Canary
Red Canary
20 views • 2 months ago
35:19
Strategies for AWS cloud challenges | Red Canary
Red Canary
52 views • 2 months ago
48:22
Bringing GenAI into your Security Operations | Red Canary
Red Canary
167 views • 2 months ago
22:13
Defenders on Defenders | Red Canary
Red Canary
299 views • 2 months ago
54:23
Unveiling the 2024 Threat Detection Report | Red Canary
Red Canary
510 views • 3 months ago
9:59
Threat Detection Report 2024 Behind the Data | Red Canary
Red Canary
293 views • 3 months ago
1:03
Red Canary | We Got You
Red Canary
444 views • 3 months ago
2:04
What is Charcoal Stork? | Red Canary Threat Intelligence
Red Canary
427 views • 3 months ago
51:22
Building a modern security operations center | Red Canary
Red Canary
1.1K views • 4 months ago
52:03
Tidying up your nest: Validating ATT&CK technique coverage using EDR telemetry
Red Canary
252 views • 4 months ago
30:53
Identity theft is not a joke, Jim!: How to detect business email compromise | Red Canary
Red Canary
349 views • 5 months ago
43:09
Drop It Like It’s Qbot (Red Canary Remix): Detecting initial execution earlier with OSINT
Red Canary
378 views • 6 months ago
1:01:36
Backdoors & Breaches: Expansion deck chronicles | Red Canary
Red Canary
230 views • 6 months ago
40:35
Validation Station: Open source threat emulation | Atomic Red Team
Red Canary
1.1K views • 7 months ago
46:33
Simplify security testing with Docker, Windows Sandbox, and Atomic Red Team
Red Canary
626 views • 7 months ago
1:00:51
Train Hard, Fight Easy: Fast, effective response to modern threats
Red Canary
331 views • 7 months ago
27:36
Swimming upstream: Moving from detection to prevention
Red Canary
169 views • 8 months ago
Load More