Skip Navigation
Get a Demo
 
Product updates

The Red Canary Blog

Security teams need an ally to help defend against adversaries. Check out our blog for breaking research and insights into threat detection, intelligence, and incident response.
SUBSCRIBE TO OUR BLOG
Patching for persistence: How DripDropper Linux malware moves through the cloud
Patching for persistence: How DripDropper Linux malware moves through the cloud
Topics (1)
Respond faster and empower users with Red Canary Managed Phishing Response
Respond faster and empower users with Red Canary Managed Phishing Response
Announcing Red Canary MDR for Cisco Duo
Announcing Red Canary MDR for Cisco Duo
Red Canary named a Leader in G2’s Summer 2025 MDR Reports — #1 in enterprise customer satisfaction
Red Canary named a Leader in G2’s Summer 2025 MDR Reports — #1 in enterprise customer satisfaction
Contain identity threats automatically with Red Canary and Microsoft Entra ID
Contain identity threats automatically with Red Canary and Microsoft Entra ID
Red Canary named a Leader in MDR
Red Canary named a Leader in MDR
Dive into the Red Canary Security Data Lake
Dive into the Red Canary Security Data Lake
The unusual suspects: Effectively identifying threats via unusual behaviors
The unusual suspects: Effectively identifying threats via unusual behaviors
Incorporating AI agents into SOC workflows
Incorporating AI agents into SOC workflows
We’re always looking for new experts to contribute interesting perspectives and improve our blog. Email us at blog@redcanary.com with article pitches, feedback, or just to say hello!

Subscribe to our blog

Security gaps? We got you.

Sign up for our monthly email newsletter for expert insights on MDR, threat intel, and security ops—straight to your inbox.


 
 
Back to Top