redcanary.com
Open in
urlscan Pro
104.198.136.223
Public Scan
Submitted URL: http://redcanary.co/
Effective URL: https://redcanary.com/
Submission: On April 15 via manual from HN — Scanned from DE
Effective URL: https://redcanary.com/
Submission: On April 15 via manual from HN — Scanned from DE
Form analysis
1 forms found in the DOMGET https://redcanary.com/
<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
<line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
<circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
</svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>
Text Content
Skip Navigation Looking to defend your network, identity, cloud infrastructure, and more? Learn the operational benefits of MDR Get a Demo Demo * Products & Solutions * Resources * Partners * Why Red Canary * Company * 2022 Threat Detection Report PDF * 2022 Executive Summary PDF * Intro * Past Reports * Threats * Techniques * Introduction * Ransomware * Supply Chain Compromises * Vulnerabilities * Affiliates * Crypters-as-a-Service * Common Webshells * User-Initiated Initial Access * Malicious macOS Installers * Remote Monitoring and Management Abuse * Linux Coinminers * Abusing Remote Procedure Calls * Defense Validation and Testing * Top Threats * Rose Flamingo * Silver Sparrow * Bazar * Latent Threats * Cobalt Strike * Impacket * SocGholish * Yellow Cockatoo * Gootkit * BloodHound * Top Techniques * Command and Scripting Interpreter * Signed Binary Proxy Execution * Windows Management Instrumentation * OS Credential Dumping * Ingress Tool Transfer * Process Injection * Scheduled Task/Job * Obfuscated Files or Information * Masquerading * Hijack Execution Flow * Impair Defenses * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo Named a leader in MDR PRODUCTS * Managed Detection and ResponseProtect your users, endpoints, and cloud * Readiness ExercisesTraining, tabletops, and atomic tests in an engaging learning platform * Linux EDRProtect production Linux endpoints that can never go down * Atomic Red Team™ [open source]Easily simulate adversary techniques to test your controls * What's New?Check out Red Canary's latest multicloud capabilities SOLUTIONS * Deliver enterprise security across your IT environment * Get a 24x7 SOC instantly * Protect your corporate endpoints and network * Protect your users’ email, identities, and SaaS apps * Protect your cloud * Protect critical production Linux and Kubernetes * Stop business email compromise * Replace your MSSP or existing MDR * Run more effective tabletops * Train continuously for real world situations * Operationalize your Microsoft security stack * Test your defenses * Minimize downtime with after-hours support * View All Resources * Blog * Guides & Overviews * Cybersecurity 101 * Case Studies * Videos * Webinars * Events * Customer Help Center Threat Detection Report Read our yearly analysis of the most prevalent security threats and trends. * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners Red Canary Partner Connect Apply to become a partner. * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security Contact Us How can we help you? Reach out to our team and we'll get in touch. * Liner Notes * Side 1: Trends * Side 2: Threats * Bonus Tracks: Techniques * Products & Solutions Products & Solutions * Managed Detection and Response * Readiness Exercises * Linux EDR * Atomic Red Team™ [open source] * What's New? * Deliver enterprise security across your IT environment * Get a 24x7 SOC instantly * Protect your corporate endpoints and network * Protect your users’ email, identities, and SaaS apps * Protect your cloud * Protect critical production Linux and Kubernetes * Stop business email compromise * Replace your MSSP or existing MDR * Operationalize your Microsoft security stack * Run more effective tabletops * Train continuously for real world situations * Test your defenses * Minimize downtime with after-hours support * Resources Resources * View All Resources * Blog * Guides & Overviews * Cybersecurity 101 * Case Studies * Videos * Webinars * Events * Customer Help Center * Partners Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Why Red Canary Why Red Canary * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo * Company Company * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security FIND AND STOP THREATS ANYWHERE Get actionable threat intelligence across cloud, identity and endpoint. Anywhere you run your business, we got you. Learn more Click for sound 1:02 DEFENDING THE FORTUNE 1000 7 of Fortune's World's Most Admired companies 5 of Fortune's America's Most Innovative companies 18 companies ranked in Fortune's Top 10 for their industry FORRESTER WAVE™ See why Red Canary is a leader with the highest possible score in nine criteria, including threat hunting and managed detection Read the report INCIDENT RESPONSE & READINESS GUIDE This guide arms security teams with the blueprint for a modern and effective incident response plan SEE THE FULL REPORT THREAT DETECTION REPORT Get the actionable insights you need to face the top threats, techniques, and trends in the evolving threat landscape New Version Just Released WE DELIVER MANAGED DETECTION AND RESPONSE (MDR) ACROSS YOUR ENTERPRISE ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS, IDENTITY, AND SAAS APPLICATIONS IN MINUTES We give organizations confidence that they’re prepared for modern adversaries as their teams work remotely, move to the cloud, and adopt new cybersecurity and IT technologies. ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS, IDENTITY, AND SAAS APPLICATIONS IN MINUTES We give organizations confidence that they’re prepared for modern adversaries as their teams work remotely, move to the cloud, and adopt new cybersecurity and IT technologies. TRUSTED DETECTION & RESPONSE Know that you’re prepared for modern threats, go beyond the alerts in your inbox, and automatically respond to and remediate the real threats. EXPERT LED Intelligence, investigation, and response from the experts who pioneered behavioral analytics, testing, and mapping to ATT&CK. CLOUD NATIVE We operationalize your security tools in minutes without complicated deployment, onboarding, or content creation programs. Explore our managed detection & response SEE THE RED CANARY DIFFERENCE WE HUNT DIFFERENTLY We optimize for coverage and cast the broadest detection net possible with more analytics and security telemetry than anyone else. 3000+ Analytics 20000+ Detection Coverage Tests 1+ Petabytes of security telemetry per day WE TREAT YOU DIFFERENTLY Enjoy a standard of service that would make the leading luxury hotel brands proud. We give you unlimited access to our 24×7 security teams whenever you need us—but at no additional cost. WE TREAT YOU DIFFERENTLY We’re always here for you – you have unlimited access to our security teams whenever you need us, at no additional cost. We’re all in this together. WHAT OTHERS ARE SAYING Previous “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog “RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE. I am always impressed with their capabilities and willingness to help. We have no doubt that we can count on them to detect adversarial behavior and provide solid incident response advice.” GARTNER PEER INSIGHTS Read more reviews Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. “RED CANARY IS POSITIONED TO CONTINUE ITS SUCCESS AND LENGTHEN ITS REACH IN THE MARKET. If the cybersecurity industry needs one example of how to make threat intelligence useful and drive detection-engineering efforts via threat hunting, look no further than Red Canary.” FORRESTER WAVE™: MANAGED DETECTION AND RESPONSE, Q2 2023 Read the full report “RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY. It’s the surety of having professionals looking at our alerts around the clock, and we have a resource to go to immediately if we have questions around detection and response.” CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP Read the case study “I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM. I communicate with them 24 hours a day, seven days a week. And I feel like they care about our security as much as my internal team does. And that’s why I call them my easy button.” CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC Read the case study “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog “RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE. I am always impressed with their capabilities and willingness to help. We have no doubt that we can count on them to detect adversarial behavior and provide solid incident response advice.” GARTNER PEER INSIGHTS Read more reviews Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. “RED CANARY IS POSITIONED TO CONTINUE ITS SUCCESS AND LENGTHEN ITS REACH IN THE MARKET. If the cybersecurity industry needs one example of how to make threat intelligence useful and drive detection-engineering efforts via threat hunting, look no further than Red Canary.” FORRESTER WAVE™: MANAGED DETECTION AND RESPONSE, Q2 2023 Read the full report “RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY. It’s the surety of having professionals looking at our alerts around the clock, and we have a resource to go to immediately if we have questions around detection and response.” CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP Read the case study “I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM. I communicate with them 24 hours a day, seven days a week. And I feel like they care about our security as much as my internal team does. And that’s why I call them my easy button.” CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC Read the case study “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog Next 01 / 05 THE RED CANARY PLATFORM * 24×7 Monitoring & Support * Advanced Threat Detection * Threat Intelligence * Response & remediation * Testing & Validation WE’RE HERE TO IMPROVE THE ENTIRE COMMUNITY Even if you’re not ready to join the flock yet, we’re committed to educating and supporting every security team through open source, resources, and community programs. RSA Conference 2024 Events| RSA Conference 2024 Translating our detection engine: A journey from JRuby to Go Articles| Security operations Translating our detection engine: A journey from JRuby to Go Holding down the Fortinet vulnerability Articles| Threat intelligence Holding down the Fortinet vulnerability The Trainman’s Guide to overlooked entry points in Microsoft Azure Articles| Threat detection The Trainman’s Guide to overlooked entry points in Microsoft Azure SEE WHAT IT'S LIKE TO HAVE A SECURITY ALLY. EXPERIENCE THE DIFFERENCE BETWEEN A SENSE OF SECURITY AND ACTUAL SECURITY. Get a demo * * * * Products * Managed Detection and Response (MDR) * Readiness Exercises * Linux EDR * Atomic Red Team™ * Mac Monitor * What’s New? * Solutions * Deliver Enterprise Security Across Your IT Environment * Get a 24×7 SOC Instantly * Protect Your Corporate Endpoints and Network * Protect Your Users’ Email, Identities, and SaaS Apps * Protect Your Cloud * Protect Critical Production Linux and Kubernetes * Stop Business Email Compromise * Replace Your MSSP or MDR * Run More Effective Tabletops * Train Continuously for Real-World Scenarios * Operationalize Your Microsoft Security Stack * Minimize Downtime with After-Hours Support * Resources * View all Resources * Blog * Integrations * Guides & Overviews * Cybersecurity 101 * Case Studies * Videos * Webinars * Events * Customer Help Center * Newsletter * Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Company * About Us * The Red Canary Difference * News & Press * Careers – We’re Hiring! * Contact Us * Trust Center and Security © 2014-2024 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686 Privacy Policy Trust Center and Security Cookies Settings Back to Top By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts per ourcookie policy Cookies Settings Reject All Accept All Cookies PRIVACY PREFERENCE CENTER Your Opt Out Preference Signal is Honored * YOUR PRIVACY * STRICTLY NECESSARY COOKIES * PERFORMANCE COOKIES * FUNCTIONAL COOKIES * ADVERTISING COOKIES YOUR PRIVACY When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information STRICTLY NECESSARY COOKIES Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. PERFORMANCE COOKIES Performance Cookies These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. FUNCTIONAL COOKIES Functional Cookies These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. ADVERTISING COOKIES Advertising Cookies These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. * CROSS-CONTEXTUAL BEHAVIORAL ADVERTISING COOKIES Switch Label label Cookies that provide targeted advertising to a consumer based on information obtained from the consumer’s activity across businesses, distinctly- branded websites, applications, or services. This is usually done via a persistent identifier that is used to identify a particular user across different companies' websites, apps, etc. Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All