redcanary.com Open in urlscan Pro
104.198.136.223  Public Scan

Submitted URL: https://s.redcanary.com/t/102369/c/daac356f-e492-45f1-9777-ee2bcd0df4d5/NB2HI4B2F4XXEZLEMNQW4YLSPEXGG33NH5YV63LBNFWGS3TH...
Effective URL: https://redcanary.com/?q_mailing_7TUwM7shunt8z54WksUhaTzw8iRAHyAXobDVq=Roapj4u5fwXVLbaXjgUtEczp463qpc1JZUcMEkHjxooC4be...
Submission: On April 27 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

GET https://redcanary.com/

<form method="get" class="search-form" action="https://redcanary.com/" __bizdiag="115" __biza="WJ__"> <svg width="20" height="19" viewBox="0 0 20 19" fill="none" xmlns="http://www.w3.org/2000/svg">
    <line x1="12.8839" y1="12.1161" x2="18.8839" y2="18.1161" stroke="black" stroke-width="2.5"></line>
    <circle cx="7.5" cy="7.5" r="6.25" stroke="black" stroke-width="2.5"></circle>
  </svg> <input id="input-search" class="search-input" name="s" type="text" placeholder="Search" autocomplete="off" autocorrect="off" autocapitalize="off" spellcheck="false"> <input type="submit" class="search-btn" value="Search"></form>

Text Content

Skip Navigation
 

Improve your incident response preparedness ATTEND WEBINAR

Get a Demo
Demo
 * Products & Solutions
 * Resources
 * Partners
 * Why Red Canary
 * Company

 * 2022 Threat Detection Report PDF
 * 2022 Executive Summary PDF

 * Intro
 * Past Reports
 * Threats
 * Techniques

 * Introduction
 * Ransomware
 * Supply Chain Compromises
 * Vulnerabilities
 * Affiliates
 * Crypters-as-a-Service
 * Common Webshells

 * User-Initiated Initial Access
 * Malicious macOS Installers
 * Remote Monitoring and Management Abuse
 * Linux Coinminers
 * Abusing Remote Procedure Calls
 * Defense Validation and Testing

 * Top Threats
 * Rose Flamingo
 * Silver Sparrow
 * Bazar
 * Latent Threats
 * Cobalt Strike

 * Impacket
 * SocGholish
 * Yellow Cockatoo
 * Gootkit
 * BloodHound

 * Top Techniques
 * Command and Scripting Interpreter
 * Signed Binary Proxy Execution
 * Windows Management Instrumentation
 * OS Credential Dumping
 * Ingress Tool Transfer

 * Process Injection
 * Scheduled Task/Job
 * Obfuscated Files or Information
 * Masquerading
 * Hijack Execution Flow
 * Impair Defenses

 * Managed Detection and Response
 * Integrations
 * The Red Canary Difference
 * Get a Demo

Named a leader in MDR

              PRODUCTS
 * Managed Detection and ResponseProtect your users, endpoints, and cloud
 * Readiness ExercisesTraining, tabletops, and atomic tests in an engaging
   learning platform
 * Linux EDRProtect production Linux endpoints that can never go down
 * Atomic Red Team™ [open source]Easily simulate adversary techniques to test
   your controls

              SOLUTIONS
 * Get a 24x7 SOC instantly
 * Protect your corporate endpoints and network
 * Protect your users’ email, identities and SaaS apps
 * Protect your cloud
 * Protect critical production Linux and Kubernetes
 * Stop business email compromise
 * Replace your MSSP or existing MDR
 * Run more effective tabletops
 * Train continuously for real world situations
 * Operationalize your Microsoft security stack
 * Test your defenses
 * Minimize downtime with after-hours support

 * View All Resources
 * Blog
 * Guides & Overviews
 * Case Studies
 * Videos
 * Webinars
 * Events
 * Customer Help Center

Blog

Sharpen your skills with the latest information, security articles, and
insights.

 * Overview
 * Incident Response
 * Insurance & Risk
 * Managed Service Providers
 * Solution Providers
 * Technology Partners

Red Canary Partner Connect

Apply to become a partner.

 * About Us
 * News & Press
 * Careers - We're Hiring!
 * Contact Us
 * Trust Center and Security

Contact Us

How can we help you? Reach out to our team and we'll get in touch.

 * Liner Notes
 * Side 1: Trends
 * Side 2: Threats
 * Bonus Tracks: Techniques

 * Products
   & Solutions
      Products & Solutions
    * Managed Detection and Response
    * Readiness Exercises
    * Linux EDR
    * Atomic Red Team™ [open source]
    * Get a 24x7 SOC instantly
    * Protect your corporate endpoints and network
    * Protect your users’ email, identities and SaaS apps
    * Protect your cloud
    * Protect critical production Linux and Kubernetes
    * Stop business email compromise
    * Replace your MSSP or existing MDR
    * Operationalize your Microsoft security stack
    * Run more effective tabletops
    * Train continuously for real world situations
    * Test your defenses
    * Minimize downtime with after-hours support

 * Resources
      Resources
    * View All Resources
    * Blog
    * Guides & Overviews
    * Case Studies
    * Videos
    * Webinars
    * Events
    * Customer Help Center

 * Partners
      Partners
    * Overview
    * Incident Response
    * Insurance & Risk
    * Managed Service Providers
    * Solution Providers
    * Technology Partners
    * Apply to Become a Partner

 * Why Red Canary
      Why Red Canary
    * Managed Detection and Response
    * Integrations
    * The Red Canary Difference
    * Get a Demo

 * Company
      Company
    * About Us
    * News & Press
    * Careers - We're Hiring!
    * Contact Us
    * Trust Center and Security

 
 
 
 
 
 
 
 


WE STOP THREATS.
YOU FOCUS ON YOUR MISSION.

Red Canary pioneered managed detection and response to secure your endpoints,
cloud, and whatever comes next.

Explore our MDR
2:30









 
 
 

FORRESTER WAVE

See why Red Canary is a leader with the highest possible score in nine criteria,
including threat hunting and managed detection

Read the report

GARTNER MARKET GUIDE

Learn why you should use MDR to obtain 24/7 security operations in the 2023
Gartner Market Guide for MDR Services

GET THE REPORT

THREAT DETECTION REPORT

Get the actionable insights you need to face the top threats, techniques, and
trends in the evolving threat landscape


SEE THE FULL REPORT


WE DELIVER MANAGED DETECTION AND RESPONSE (MDR) ACROSS YOUR ENTERPRISE





ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS,
IDENTITY, AND SAAS APPLICATIONS IN MINUTES

We give organizations confidence that they’re prepared for modern adversaries as
their teams work remotely, move to the cloud, and adopt new cybersecurity and IT
technologies.


ACTIVATE WORLD CLASS SECURITY FOR YOUR ENDPOINTS, NETWORK, CLOUD WORKLOADS,
IDENTITY, AND SAAS APPLICATIONS IN MINUTES

We give organizations confidence that they’re prepared for modern adversaries as
their teams work remotely, move to the cloud, and adopt new cybersecurity and IT
technologies.

TRUSTED DETECTION & RESPONSE

Know that you’re prepared for modern threats, go beyond the alerts in your
inbox, and automatically respond to and remediate the real threats.

EXPERT LED

Intelligence, investigation, and response from the experts who pioneered
behavioral analytics, testing, and mapping to ATT&CK.

CLOUD NATIVE

We operationalize your security tools in minutes without complicated deployment,
onboarding, or content creation programs.

Explore our managed detection & response


 
 
 

SEE THE RED CANARY DIFFERENCE


WE HUNT DIFFERENTLY

We optimize for coverage and cast the broadest detection net possible with more
analytics and security telemetry than anyone else.


3000+

Analytics


20000+

Detection Coverage Tests


1+

Petabytes of security telemetry per day

 


WE TREAT YOU DIFFERENTLY

Enjoy a standard of service that would make the leading luxury hotel brands
proud. We give you unlimited access to our 24×7 security teams whenever you need
us—but at no additional cost.

 


WE TREAT YOU DIFFERENTLY

We’re always here for you – you have unlimited access to our security teams
whenever you need us, at no additional cost.

We’re all in this together.

WHAT OTHERS ARE SAYING

Previous
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
 



“RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE.

I am always impressed with their capabilities and willingness to help. We have
no doubt that we can count on them to detect adversarial behavior and provide
solid incident response advice.”

GARTNER PEER INSIGHTS

Read more reviews

Gartner Peer Insights reviews constitute the subjective opinions of individual
end users based on their own experiences and do not represent the views of
Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and
service mark of Gartner, Inc. and/or its affiliates and is used herein with
permission. All rights reserved. Gartner Peer Insights reviews constitute the
subjective opinions of individual end users based on their own experiences and
do not represent the views of Gartner or its affiliates.

 



“RED CANARY OPERATES AS A SECURITY ALLY FOR ITS CLIENTS.

Red Canary is one of the earliest MDR players. In spite of the vast number of
newcomers that have entered the market, it remains a vendor that truly
understands what its MDR clients need and want from a provider.”

FORRESTER WAVE, MANAGED DETECTION AND RESPONSE, 2021

Read the full report
 



“RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY.

It’s the surety of having professionals looking at our alerts around the clock,
and we have a resource to go to immediately if we have questions around
detection and response.”

CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP

Read the case study
 



“I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM.

I communicate with them 24 hours a day, seven days a week. And I feel like they
care about our security as much as my internal team does. And that’s why I call
them my easy button.”

CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC

Read the case study
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
 



“RED CANARY HAS EXCEPTIONAL DETECTION TECHNOLOGY AND CUSTOMER SERVICE.

I am always impressed with their capabilities and willingness to help. We have
no doubt that we can count on them to detect adversarial behavior and provide
solid incident response advice.”

GARTNER PEER INSIGHTS

Read more reviews

Gartner Peer Insights reviews constitute the subjective opinions of individual
end users based on their own experiences and do not represent the views of
Gartner or its affiliates. The GARTNER PEER INSIGHTS Logo is a trademark and
service mark of Gartner, Inc. and/or its affiliates and is used herein with
permission. All rights reserved. Gartner Peer Insights reviews constitute the
subjective opinions of individual end users based on their own experiences and
do not represent the views of Gartner or its affiliates.

 



“RED CANARY OPERATES AS A SECURITY ALLY FOR ITS CLIENTS.

Red Canary is one of the earliest MDR players. In spite of the vast number of
newcomers that have entered the market, it remains a vendor that truly
understands what its MDR clients need and want from a provider.”

FORRESTER WAVE, MANAGED DETECTION AND RESPONSE, 2021

Read the full report
 



“RED CANARY - IT’S THE CORRECT THING TO DO FOR SECURITY.

It’s the surety of having professionals looking at our alerts around the clock,
and we have a resource to go to immediately if we have questions around
detection and response.”

CYBER SECURITY TECHNICAL TEAM LEAD, COSTAR GROUP

Read the case study
 



“I VIEW RED CANARY AS AN EXTENSION OF MY INTERNAL TEAM.

I communicate with them 24 hours a day, seven days a week. And I feel like they
care about our security as much as my internal team does. And that’s why I call
them my easy button.”

CHIEF INFORMATION SECURITY & PRIVACY OFFICER, THYCOTIC

Read the case study
 


“OUTSTANDING LEADERS IN ACCELERATING CUSTOMERS’ EFFORTS TO MITIGATE
CYBERSECURITY THREATS.”

Microsoft recognized Red Canary as the winner of its 2022 Security Trailblazer
Award.

Read the blog
Next
01 / 05
 
 
 


THE RED CANARY PLATFORM

 * 24×7 Monitoring & Support
 * Advanced Threat Detection
 * Threat Intelligence
 * Response & remediation
 * Testing & Validation

 



WE’RE HERE TO IMPROVE THE ENTIRE COMMUNITY

Even if you’re not ready to join the flock yet, we’re committed to educating and
supporting every security team through open source, resources, and community
programs.

Microsoft recognizes Katie Nickels for her impact on the security community

Articles| Microsoft
Microsoft recognizes Katie Nickels for her impact on the security community
CISO’s Debate: Do on-prem security strategies also work in the cloud?

Webinars| Security operations
CISO’s Debate: Do on-prem security strategies also work in the cloud?
Intelligence Insights: April 2023

Articles| Threat intelligence
Intelligence Insights: April 2023
Gartner Security & Risk Management Summit

Events|
Gartner Security & Risk Management Summit
 


SEE WHAT IT'S LIKE TO HAVE A SECURITY ALLY.

EXPERIENCE THE DIFFERENCE BETWEEN A SENSE OF SECURITY AND ACTUAL SECURITY.

Get a demo
 * 
 * 
 * 


 * Products & Solutions
   * Atomic Red Team™
   * MDR Everywhere
   * MDR for Microsoft
   * Active Remediation
   * Replace your MSSP
   * Post-Breach Response
   * EDR Deployment
   * EDR Migration
   * Linux Security
   * Alert Triage
   * Mac Monitor
 * Resources
   * View all Resources
   * Blog
   * Guides & Overviews
   * Case Studies
   * Videos
   * Webinars
   * Events
   * Customer Help Center
   * Newsletter
 * Partners
   * Overview
   * Incident Response
   * Insurance & Risk
   * Managed Service Providers
   * Solution Providers
   * Technology Partners
   * Apply to Become a Partner
 * Why Red Canary?
   * Managed Detection and Response
   * Integrations
   * The Red Canary Difference
   * Get a Demo
 * Company
   * About Us
   * News & Press
   * Careers – We’re Hiring!
   * Contact Us
   * Trust Center and Security

© 2014-2023 Red Canary. All rights reserved. info@redcanary.com +1 855-977-0686
Privacy Policy Trust Center and Security

 

 
 

 
Our website uses cookies to provide you with a better browsing experience. More
information can be found in our Privacy Policy.
OK
Privacy & Cookies Policy
Close

PRIVACY OVERVIEW

This website uses cookies to improve your experience while you navigate through
the website. Out of these cookies, the cookies that are categorized as necessary
are stored on your browser as they are essential for the working of basic
functionalities...
Necessary
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly.
This category only includes cookies that ensures basic functionalities and
security features of the website. These cookies do not store any personal
information.
Non-necessary
Non-necessary
Any cookies that may not be particularly necessary for the website to function
and is used specifically to collect user personal data via analytics, ads, other
embedded contents are termed as non-necessary cookies. It is mandatory to
procure user consent prior to running these cookies on your website.
SAVE & ACCEPT


Back to Top