Red Canary
5.57K subscribers
3:05
3 things to consider when buying EDR | Red Canary
Red Canary
95 views • 3 days ago
1:32
Top threats leveraging NetSupport Manager | Red Canary Threat Intelligence
Red Canary
80 views • 11 days ago
45:09
Optimize your SOC with product management & intelligence-led strategies | Red Canary
Red Canary
154 views • 2 weeks ago
58:23
Detecting and responding to stealer malware in 2024 | Red Canary
Red Canary
491 views • 3 weeks ago
52:41
The Detection Series: Windows Management Instrumentation (Part 2) | Red Canary
Red Canary
184 views • 4 weeks ago
28:28
The Detection Series: Windows Management Instrumentation (Part 1) | Red Canary
Red Canary
310 views • 1 month ago
1:02:24
The Detection Series: Installer packages | Red Canary
Red Canary
257 views • 1 month ago
2:08
How adversaries use SEO poisoning to serve up malware | Red Canary
Red Canary
156 views • 1 month ago
39:56
Establishing an effective response capability | Red Canary
Red Canary
133 views • 1 month ago
1:31
SocGholish malware dominates April threat landscape | Red Canary Threat Intelligence
Red Canary
151 views • 1 month ago
48:35
Overcoming cloud security challenges | Red Canary
Red Canary
130 views • 2 months ago
44:56
Identify and address multicloud challenges | Red Canary
Red Canary
17 views • 2 months ago
35:19
Strategies for AWS cloud challenges | Red Canary
Red Canary
42 views • 2 months ago
48:22
Bringing GenAI into your Security Operations | Red Canary
Red Canary
150 views • 2 months ago
22:13
Defenders on Defenders | Red Canary
Red Canary
292 views • 2 months ago
54:23
Unveiling the 2024 Threat Detection Report | Red Canary
Red Canary
492 views • 2 months ago
9:58
Threat Detection Report 2024 Behind the Data | Red Canary
Red Canary
284 views • 2 months ago
1:03
Red Canary | We Got You
Red Canary
388 views • 3 months ago
2:04
What is Charcoal Stork? | Red Canary Threat Intelligence
Red Canary
421 views • 3 months ago
51:22
Building a modern security operations center | Red Canary
Red Canary
1K views • 3 months ago
52:03
Tidying up your nest: Validating ATT&CK technique coverage using EDR telemetry
Red Canary
245 views • 4 months ago
30:53
Identity theft is not a joke, Jim!: How to detect business email compromise | Red Canary
Red Canary
339 views • 5 months ago
43:09
Drop It Like It’s Qbot (Red Canary Remix): Detecting initial execution earlier with OSINT
Red Canary
373 views • 5 months ago
1:01:36
Backdoors & Breaches: Expansion deck chronicles | Red Canary
Red Canary
228 views • 6 months ago
40:35
Validation Station: Open source threat emulation | Atomic Red Team
Red Canary
1.1K views • 6 months ago
46:33
Simplify security testing with Docker, Windows Sandbox, and Atomic Red Team
Red Canary
613 views • 6 months ago
1:00:51
Train Hard, Fight Easy: Fast, effective response to modern threats
Red Canary
326 views • 7 months ago
27:36
Swimming upstream: Moving from detection to prevention
Red Canary
168 views • 8 months ago
29:15
Exploring the dark arts on macOS | Red Canary
Red Canary
286 views • 8 months ago
56:23
The Detection Series: Remote access tools
Red Canary
737 views • 8 months ago
Load More