redcanary.com
Open in
urlscan Pro
104.198.136.223
Public Scan
Submitted URL: https://s.redcanary.com/t/102369/c/daac356f-e492-45f1-9777-ee2bcd0df4d5/NB2HI4B2F4XXEZLEMNQW4YLSPEXGG33NH5YV63LBNFWGS3TH...
Effective URL: https://redcanary.com/?q_mailing_7TUwM7shunt8z54WksUhaTzw8iRAHyAXobDVq=Roapj4u5fwXVLbaXjgUtEczp463qpc1JZUcMEkHjxooC4be...
Submission: On April 27 via manual from IN — Scanned from DE
Effective URL: https://redcanary.com/?q_mailing_7TUwM7shunt8z54WksUhaTzw8iRAHyAXobDVq=Roapj4u5fwXVLbaXjgUtEczp463qpc1JZUcMEkHjxooC4be...
Submission: On April 27 via manual from IN — Scanned from DE
Form analysis
1 forms found in the DOMGET https://redcanary.com/
<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
<line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
<circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
</svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>
Text Content
Skip Navigation Improve your incident response preparedness ATTEND WEBINAR Get a Demo Demo * Products & Solutions * Resources * Partners * Why Red Canary * Company * 2022 Threat Detection Report PDF * 2022 Executive Summary PDF * Intro * Past Reports * Threats * Techniques * Introduction * Ransomware * Supply Chain Compromises * Vulnerabilities * Affiliates * Crypters-as-a-Service * Common Webshells * User-Initiated Initial Access * Malicious macOS Installers * Remote Monitoring and Management Abuse * Linux Coinminers * Abusing Remote Procedure Calls * Defense Validation and Testing * Top Threats * Rose Flamingo * Silver Sparrow * Bazar * Latent Threats * Cobalt Strike * Impacket * SocGholish * Yellow Cockatoo * Gootkit * BloodHound * Top Techniques * Command and Scripting Interpreter * Signed Binary Proxy Execution * Windows Management Instrumentation * OS Credential Dumping * Ingress Tool Transfer * Process Injection * Scheduled Task/Job * Obfuscated Files or Information * Masquerading * Hijack Execution Flow * Impair Defenses * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo Named a leader in MDR PRODUCTS * Managed Detection and ResponseProtect your users, endpoints, and cloud * Readiness ExercisesTraining, tabletops, and atomic tests in an engaging learning platform * Linux EDRProtect production Linux endpoints that can never go down * Atomic Red Team™ [open source]Easily simulate adversary techniques to test your controls SOLUTIONS * Get a 24x7 SOC instantly * Protect your corporate endpoints and network * Protect your users’ email, identities and SaaS apps * Protect your cloud * Protect critical production Linux and Kubernetes * Stop business email compromise * Replace your MSSP or existing MDR * Run more effective tabletops * Train continuously for real world situations * Operationalize your Microsoft security stack * Test your defenses * Minimize downtime with after-hours support * View All Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center Blog Sharpen your skills with the latest information, security articles, and insights. * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners Red Canary Partner Connect Apply to become a partner. * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security Contact Us How can we help you? Reach out to our team and we'll get in touch. * Liner Notes * Side 1: Trends * Side 2: Threats * Bonus Tracks: Techniques * Products & Solutions Products & Solutions * Managed Detection and Response * Readiness Exercises * Linux EDR * Atomic Red Team™ [open source] * Get a 24x7 SOC instantly * Protect your corporate endpoints and network * Protect your users’ email, identities and SaaS apps * Protect your cloud * Protect critical production Linux and Kubernetes * Stop business email compromise * Replace your MSSP or existing MDR * Operationalize your Microsoft security stack * Run more effective tabletops * Train continuously for real world situations * Test your defenses * Minimize downtime with after-hours support * Resources Resources * View All Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center * Partners Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Why Red Canary Why Red Canary * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo * Company Company * About Us * News & Press * Careers - We're Hiring! * Contact Us * Trust Center and Security WE STOP THREATS. YOU FOCUS ON YOUR MISSION. Red Canary pioneered managed detection and response to secure your endpoints, cloud, and whatever comes next. Explore our MDR 2:30 FORRESTER WAVE See why Red Canary is a leader with the highest possible score in nine criteria, including threat hunting and managed detection Read the report GARTNER MARKET GUIDE Learn why you should use MDR to obtain 24/7 security operations in the 2023 Gartner Market Guide for MDR Services GET THE REPORT THREAT DETECTION REPORT Get the actionable insights you need to face the top threats, techniques, and trends in the evolving threat landscape SEE THE FULL REPORT WE DELIVER MANAGED DETECTION AND RESPONSE (MDR) ACROSS YOUR ENTERPRISE ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS, IDENTITY, AND SAAS APPLICATIONS IN MINUTES We give organizations confidence that they’re prepared for modern adversaries as their teams work remotely, move to the cloud, and adopt new cybersecurity and IT technologies. ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS, IDENTITY, AND SAAS APPLICATIONS IN MINUTES We give organizations confidence that they’re prepared for modern adversaries as their teams work remotely, move to the cloud, and adopt new cybersecurity and IT technologies. TRUSTED DETECTION & RESPONSE Know that you’re prepared for modern threats, go beyond the alerts in your inbox, and automatically respond to and remediate the real threats. EXPERT LED Intelligence, investigation, and response from the experts who pioneered behavioral analytics, testing, and mapping to ATT&CK. CLOUD NATIVE We operationalize your security tools in minutes without complicated deployment, onboarding, or content creation programs. Explore our managed detection & response SEE THE RED CANARY DIFFERENCE WE HUNT DIFFERENTLY We optimize for coverage and cast the broadest detection net possible with more analytics and security telemetry than anyone else. 3000+ Analytics 20000+ Detection Coverage Tests 1+ Petabytes of security telemetry per day WE TREAT YOU DIFFERENTLY Enjoy a standard of service that would make the leading luxury hotel brands proud. We give you unlimited access to our 24×7 security teams whenever you need us—but at no additional cost. WE TREAT YOU DIFFERENTLY We’re always here for you – you have unlimited access to our security teams whenever you need us, at no additional cost. We’re all in this together. WHAT OTHERS ARE SAYING Previous “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog “RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE. I am always impressed with their capabilities and willingness to help. We have no doubt that we can count on them to detect adversarial behavior and provide solid incident response advice.” GARTNER PEER INSIGHTS Read more reviews Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. “RED CANARY OPERATES AS A SECURITY ALLY FOR ITS CLIENTS. Red Canary is one of the earliest MDR players. In spite of the vast number of newcomers that have entered the market, it remains a vendor that truly understands what its MDR clients need and want from a provider.” FORRESTER WAVE, MANAGED DETECTION AND RESPONSE, 2021 Read the full report “RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY. It’s the surety of having professionals looking at our alerts around the clock, and we have a resource to go to immediately if we have questions around detection and response.” CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP Read the case study “I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM. I communicate with them 24 hours a day, seven days a week. And I feel like they care about our security as much as my internal team does. And that’s why I call them my easy button.” CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC Read the case study “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog “RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE. I am always impressed with their capabilities and willingness to help. We have no doubt that we can count on them to detect adversarial behavior and provide solid incident response advice.” GARTNER PEER INSIGHTS Read more reviews Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights reviews constitute the subjective opinions of individual end users based on their own experiences and do not represent the views of Gartner or its affiliates. “RED CANARY OPERATES AS A SECURITY ALLY FOR ITS CLIENTS. Red Canary is one of the earliest MDR players. In spite of the vast number of newcomers that have entered the market, it remains a vendor that truly understands what its MDR clients need and want from a provider.” FORRESTER WAVE, MANAGED DETECTION AND RESPONSE, 2021 Read the full report “RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY. It’s the surety of having professionals looking at our alerts around the clock, and we have a resource to go to immediately if we have questions around detection and response.” CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP Read the case study “I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM. I communicate with them 24 hours a day, seven days a week. And I feel like they care about our security as much as my internal team does. And that’s why I call them my easy button.” CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC Read the case study “OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE CYBERSECURITY THREATS.” Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer Award. Read the blog Next 01 / 05 THE RED CANARY PLATFORM * 24×7 Monitoring & Support * Advanced Threat Detection * Threat Intelligence * Response & remediation * Testing & Validation WE’RE HERE TO IMPROVE THE ENTIRE COMMUNITY Even if you’re not ready to join the flock yet, we’re committed to educating and supporting every security team through open source, resources, and community programs. Microsoft recognizes Katie Nickels for her impact on the security community Articles| Microsoft Microsoft recognizes Katie Nickels for her impact on the security community CISO’s Debate: Do on-prem security strategies also work in the cloud? Webinars| Security operations CISO’s Debate: Do on-prem security strategies also work in the cloud? Intelligence Insights: April 2023 Articles| Threat intelligence Intelligence Insights: April 2023 Gartner Security & Risk Management Summit Events| Gartner Security & Risk Management Summit SEE WHAT IT'S LIKE TO HAVE A SECURITY ALLY. EXPERIENCE THE DIFFERENCE BETWEEN A SENSE OF SECURITY AND ACTUAL SECURITY. Get a demo * * * * Products & Solutions * Atomic Red Team™ * MDR Everywhere * MDR for Microsoft * Active Remediation * Replace your MSSP * Post-Breach Response * EDR Deployment * EDR Migration * Linux Security * Alert Triage * Mac Monitor * Resources * View all Resources * Blog * Guides & Overviews * Case Studies * Videos * Webinars * Events * Customer Help Center * Newsletter * Partners * Overview * Incident Response * Insurance & Risk * Managed Service Providers * Solution Providers * Technology Partners * Apply to Become a Partner * Why Red Canary? * Managed Detection and Response * Integrations * The Red Canary Difference * Get a Demo * Company * About Us * News & Press * Careers – We’re Hiring! * Contact Us * Trust Center and Security © 2014-2023 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686 Privacy Policy Trust Center and Security Our website uses cookies to provide you with a better browsing experience. More information can be found in our Privacy Policy. OK Privacy & Cookies Policy Close PRIVACY OVERVIEW This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities... Necessary Necessary Always Enabled Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information. Non-necessary Non-necessary Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website. SAVE & ACCEPT Back to Top