Skip Navigation
Get a Demo
 
MITRE ATT&CK

The Red Canary Blog

Security teams need an ally to help defend against adversaries. Check out our blog for breaking research and insights into threat detection, intelligence, and incident response.
SUBSCRIBE TO OUR BLOG
Mocha Manakin delivers custom NodeJS backdoor via paste and run
Mocha Manakin delivers custom NodeJS backdoor via paste and run
A large learning model: Red Canary’s AI journey
A large learning model: Red Canary’s AI journey
Topics (1)
MSIX and other tricks: How to detect malicious installer packages
MSIX and other tricks: How to detect malicious installer packages
Inside the 2024 Threat Detection Report
Inside the 2024 Threat Detection Report
Why adversaries have their heads in the cloud
Why adversaries have their heads in the cloud
Emu-lation: Validating detections for SocGholish with Atomic Red Team
Emu-lation: Validating detections for SocGholish with Atomic Red Team
Better know a data source: Network telemetry
Better know a data source: Network telemetry
Emu-lation: Validating detection for Gootloader with Atomic Red Team
Emu-lation: Validating detection for Gootloader with Atomic Red Team
Safely validate executable file attributes with Atomic Test Harnesses
Safely validate executable file attributes with Atomic Test Harnesses
The dark side of Microsoft Remote Procedure Call protocols
The dark side of Microsoft Remote Procedure Call protocols
We’re always looking for new experts to contribute interesting perspectives and improve our blog. Email us at blog@redcanary.com with article pitches, feedback, or just to say hello!

Subscribe to our blog

Security gaps? We got you.

Get curated insights on managed detection and response (MDR) services, threat intelligence, and security operations—delivered straight to your inbox every month.


 
 
Back to Top