redcanary.com Open in urlscan Pro
104.198.136.223  Public Scan

Submitted URL: http://redcanary.co/
Effective URL: https://redcanary.com/
Submission: On April 15 via manual from HN — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://redcanary.com/

<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
    <line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
    <circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
  </svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>

Text Content

Skip Navigation
 

Looking to defend your network, identity, cloud infrastructure, and more? Learn
the operational benefits of MDR

Get a Demo
Demo
 * Products & Solutions
 * Resources
 * Partners
 * Why Red Canary
 * Company

 * 2022 Threat Detection Report PDF
 * 2022 Executive Summary PDF

 * Intro
 * Past Reports
 * Threats
 * Techniques

 * Introduction
 * Ransomware
 * Supply Chain Compromises
 * Vulnerabilities
 * Affiliates
 * Crypters-as-a-Service
 * Common Webshells

 * User-Initiated Initial Access
 * Malicious macOS Installers
 * Remote Monitoring and Management Abuse
 * Linux Coinminers
 * Abusing Remote Procedure Calls
 * Defense Validation and Testing

 * Top Threats
 * Rose Flamingo
 * Silver Sparrow
 * Bazar
 * Latent Threats
 * Cobalt Strike

 * Impacket
 * SocGholish
 * Yellow Cockatoo
 * Gootkit
 * BloodHound

 * Top Techniques
 * Command and Scripting Interpreter
 * Signed Binary Proxy Execution
 * Windows Management Instrumentation
 * OS Credential Dumping
 * Ingress Tool Transfer

 * Process Injection
 * Scheduled Task/Job
 * Obfuscated Files or Information
 * Masquerading
 * Hijack Execution Flow
 * Impair Defenses

 * Managed Detection and Response
 * Integrations
 * The Red Canary Difference
 * Get a Demo

Named a leader in MDR

              PRODUCTS
 * Managed Detection and ResponseProtect your users, endpoints, and cloud
 * Readiness ExercisesTraining, tabletops, and atomic tests in an engaging
   learning platform
 * Linux EDRProtect production Linux endpoints that can never go down
 * Atomic Red Team™ [open source]Easily simulate adversary techniques to test
   your controls
 * What's New?Check out Red Canary's latest multicloud capabilities

              SOLUTIONS
 * Deliver enterprise security across your IT environment
 * Get a 24x7 SOC instantly
 * Protect your corporate endpoints and network
 * Protect your users’ email, identities, and SaaS apps
 * Protect your cloud
 * Protect critical production Linux and Kubernetes
 * Stop business email compromise
 * Replace your MSSP or existing MDR
 * Run more effective tabletops
 * Train continuously for real world situations
 * Operationalize your Microsoft security stack
 * Test your defenses
 * Minimize downtime with after-hours support

 * View All Resources
 * Blog
 * Guides & Overviews
 * Cybersecurity 101
 * Case Studies
 * Videos
 * Webinars
 * Events
 * Customer Help Center

Threat Detection Report

Read our yearly analysis of the most prevalent security threats and trends.

 * Overview
 * Incident Response
 * Insurance & Risk
 * Managed Service Providers
 * Solution Providers
 * Technology Partners

Red Canary Partner Connect

Apply to become a partner.

 * About Us
 * News & Press
 * Careers - We're Hiring!
 * Contact Us
 * Trust Center and Security

Contact Us

How can we help you? Reach out to our team and we'll get in touch.

 * Liner Notes
 * Side 1: Trends
 * Side 2: Threats
 * Bonus Tracks: Techniques

 * Products
   & Solutions
      Products & Solutions
    * Managed Detection and Response
    * Readiness Exercises
    * Linux EDR
    * Atomic Red Team™ [open source]
    * What's New?
    * Deliver enterprise security across your IT environment
    * Get a 24x7 SOC instantly
    * Protect your corporate endpoints and network
    * Protect your users’ email, identities, and SaaS apps
    * Protect your cloud
    * Protect critical production Linux and Kubernetes
    * Stop business email compromise
    * Replace your MSSP or existing MDR
    * Operationalize your Microsoft security stack
    * Run more effective tabletops
    * Train continuously for real world situations
    * Test your defenses
    * Minimize downtime with after-hours support

 * Resources
      Resources
    * View All Resources
    * Blog
    * Guides & Overviews
    * Cybersecurity 101
    * Case Studies
    * Videos
    * Webinars
    * Events
    * Customer Help Center

 * Partners
      Partners
    * Overview
    * Incident Response
    * Insurance & Risk
    * Managed Service Providers
    * Solution Providers
    * Technology Partners
    * Apply to Become a Partner

 * Why Red Canary
      Why Red Canary
    * Managed Detection and Response
    * Integrations
    * The Red Canary Difference
    * Get a Demo

 * Company
      Company
    * About Us
    * News & Press
    * Careers - We're Hiring!
    * Contact Us
    * Trust Center and Security

 
 
 
 
 
 
 
 


FIND AND STOP THREATS ANYWHERE

Get actionable threat intelligence across cloud, identity and endpoint. Anywhere
you run your business, we got you.

Learn more
Click for sound



1:02









 
 
 

DEFENDING THE FORTUNE 1000

7 of Fortune's World's Most Admired companies

5 of Fortune's America's Most Innovative companies

18 companies ranked in Fortune's Top 10 for their industry

FORRESTER WAVE™

See why Red Canary is a leader with the highest possible score in nine criteria,
including threat hunting and managed detection

Read the report

INCIDENT RESPONSE & READINESS GUIDE

This guide arms security teams with the blueprint for a modern and effective
incident response plan

SEE THE FULL REPORT

THREAT DETECTION REPORT

Get the actionable insights you need to face the top threats, techniques, and
trends in the evolving threat landscape



New Version Just Released


WE DELIVER MANAGED DETECTION AND RESPONSE (MDR) ACROSS YOUR ENTERPRISE





ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS,
IDENTITY, AND SAAS APPLICATIONS IN MINUTES

We give organizations confidence that they’re prepared for modern adversaries as
their teams work remotely, move to the cloud, and adopt new cybersecurity and IT
technologies.


ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS,
IDENTITY, AND SAAS APPLICATIONS IN MINUTES

We give organizations confidence that they’re prepared for modern adversaries as
their teams work remotely, move to the cloud, and adopt new cybersecurity and IT
technologies.

TRUSTED DETECTION & RESPONSE

Know that you’re prepared for modern threats, go beyond the alerts in your
inbox, and automatically respond to and remediate the real threats.

EXPERT LED

Intelligence, investigation, and response from the experts who pioneered
behavioral analytics, testing, and mapping to ATT&CK.

CLOUD NATIVE

We operationalize your security tools in minutes without complicated deployment,
onboarding, or content creation programs.

Explore our managed detection & response


 
 
 

SEE THE RED CANARY DIFFERENCE


WE HUNT DIFFERENTLY

We optimize for coverage and cast the broadest detection net possible with more
analytics and security telemetry than anyone else.


3000+

Analytics


20000+

Detection Coverage Tests


1+

Petabytes of security telemetry per day

 


WE TREAT YOU DIFFERENTLY

Enjoy a standard of service that would make the leading luxury hotel brands
proud. We give you unlimited access to our 24×7 security teams whenever you need
us—but at no additional cost.

 


WE TREAT YOU DIFFERENTLY

We’re always here for you – you have unlimited access to our security teams
whenever you need us, at no additional cost.

We’re all in this together.

WHAT OTHERS ARE SAYING

Previous
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
 



“RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE.

I am always impressed with their capabilities and willingness to help. We have
no doubt that we can count on them to detect adversarial behavior and provide
solid incident response advice.”

GARTNER PEER INSIGHTS

Read more reviews

Gartner Peer Insights reviews constitute the subjective opinions of individual
end users based on their own experiences and do not represent the views of
Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and
service mark of Gartner, Inc. and/or its affiliates and is used herein with
permission. All rights reserved. Gartner Peer Insights reviews constitute the
subjective opinions of individual end users based on their own experiences and
do not represent the views of Gartner or its affiliates.

 



“RED CANARY IS POSITIONED TO CONTINUE ITS SUCCESS AND LENGTHEN ITS REACH IN THE
MARKET.

If the cybersecurity industry needs one example of how to make threat
intelligence useful and drive detection-engineering efforts via threat hunting,
look no further than Red Canary.”

FORRESTER WAVE™: MANAGED DETECTION AND RESPONSE, Q2 2023

Read the full report
 



“RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY.

It’s the surety of having professionals looking at our alerts around the clock,
and we have a resource to go to immediately if we have questions around
detection and response.”

CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP

Read the case study
 



“I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM.

I communicate with them 24 hours a day, seven days a week. And I feel like they
care about our security as much as my internal team does. And that’s why I call
them my easy button.”

CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC

Read the case study
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
 



“RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE.

I am always impressed with their capabilities and willingness to help. We have
no doubt that we can count on them to detect adversarial behavior and provide
solid incident response advice.”

GARTNER PEER INSIGHTS

Read more reviews

Gartner Peer Insights reviews constitute the subjective opinions of individual
end users based on their own experiences and do not represent the views of
Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and
service mark of Gartner, Inc. and/or its affiliates and is used herein with
permission. All rights reserved. Gartner Peer Insights reviews constitute the
subjective opinions of individual end users based on their own experiences and
do not represent the views of Gartner or its affiliates.

 



“RED CANARY IS POSITIONED TO CONTINUE ITS SUCCESS AND LENGTHEN ITS REACH IN THE
MARKET.

If the cybersecurity industry needs one example of how to make threat
intelligence useful and drive detection-engineering efforts via threat hunting,
look no further than Red Canary.”

FORRESTER WAVE™: MANAGED DETECTION AND RESPONSE, Q2 2023

Read the full report
 



“RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY.

It’s the surety of having professionals looking at our alerts around the clock,
and we have a resource to go to immediately if we have questions around
detection and response.”

CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP

Read the case study
 



“I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM.

I communicate with them 24 hours a day, seven days a week. And I feel like they
care about our security as much as my internal team does. And that’s why I call
them my easy button.”

CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC

Read the case study
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
Next
01 / 05
 
 
 


THE RED CANARY PLATFORM

 * 24×7 Monitoring & Support
 * Advanced Threat Detection
 * Threat Intelligence
 * Response & remediation
 * Testing & Validation

 



WE’RE HERE TO IMPROVE THE ENTIRE COMMUNITY

Even if you’re not ready to join the flock yet, we’re committed to educating and
supporting every security team through open source, resources, and community
programs.

RSA Conference 2024

Events|
RSA Conference 2024
Translating our detection engine: A journey from JRuby to Go

Articles| Security operations
Translating our detection engine: A journey from JRuby to Go
Holding down the Fortinet vulnerability

Articles| Threat intelligence
Holding down the Fortinet vulnerability
The Trainman’s Guide to overlooked entry points in Microsoft Azure

Articles| Threat detection
The Trainman’s Guide to overlooked entry points in Microsoft Azure
 


SEE WHAT IT'S LIKE TO HAVE A SECURITY ALLY.

EXPERIENCE THE DIFFERENCE BETWEEN A SENSE OF SECURITY AND ACTUAL SECURITY.

Get a demo
 * 
 * 
 * 


 * Products
   * Managed Detection and Response (MDR)
   * Readiness Exercises
   * Linux EDR
   * Atomic Red Team™
   * Mac Monitor
   * What’s New?
 * Solutions
   * Deliver Enterprise Security Across Your IT Environment
   * Get a 24×7 SOC Instantly
   * Protect Your Corporate Endpoints and Network
   * Protect Your Users’ Email, Identities, and SaaS Apps
   * Protect Your Cloud
   * Protect Critical Production Linux and Kubernetes
   * Stop Business Email Compromise
   * Replace Your MSSP or MDR
   * Run More Effective Tabletops
   * Train Continuously for Real-World Scenarios
   * Operationalize Your Microsoft Security Stack
   * Minimize Downtime with After-Hours Support
 * Resources
   * View all Resources
   * Blog
   * Integrations
   * Guides & Overviews
   * Cybersecurity 101
   * Case Studies
   * Videos
   * Webinars
   * Events
   * Customer Help Center
   * Newsletter
 * Partners
   * Overview
   * Incident Response
   * Insurance & Risk
   * Managed Service Providers
   * Solution Providers
   * Technology Partners
   * Apply to Become a Partner
 * Company
   * About Us
   * The Red Canary Difference
   * News & Press
   * Careers – We’re Hiring!
   * Contact Us
   * Trust Center and Security

© 2014-2024 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686
Privacy Policy Trust Center and Security      Cookies Settings

 

 
 

 
Back to Top
By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts per ourcookie policy
Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER



Your Opt Out Preference Signal is Honored


 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * ADVERTISING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

ADVERTISING COOKIES

Advertising Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

 * CROSS-CONTEXTUAL BEHAVIORAL ADVERTISING COOKIES
   
   Switch Label label
   
   Cookies that provide targeted advertising to a consumer based on information
   obtained from the consumer’s activity across businesses, distinctly- branded
   websites, applications, or services. This is usually done via a persistent
   identifier that is used to identify a particular user across different
   companies' websites, apps, etc.

Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All