Skip Navigation
 

Red Canary 2022 Threat Detection Report

 

Understand prevalent trends, threats, and adversary techniques

This report is intended to educate you about the threats your team is likely to face so you can:

  • Implement preventive controls to mitigate relevant threats
  • Collect the right telemetry to gain visibility into common adversary techniques
  • Develop defense in depth with reliable detection analytics
  • Validate your security controls with realistic Atomic Red Team tests
Access the findings
 
2022_TDR-cover

Understand prevalent trends, threats, and adversary techniques

This report is intended to educate you about the threats your team is likely to face so you can:

  • Implement preventive controls to mitigate relevant threats
  • Collect the right telemetry to gain visibility into common adversary techniques
  • Develop defense in depth with reliable detection analytics
  • Validate your security controls with realistic Atomic Red Team tests
Access the findings

A year’s worth of research, distilled into one actionable report

30k

confirmed threats fueled the insights this guide

1 petabyte

of telemetry processed per day

4000 hours

spent analyzing detection data, developing insights, and delivering this report

 

Red Canary’s 2022 Threat Detection Report is Based on in-depth analysis of more than 30,000 confirmed threats detected across our customers’ environments, this research arms security leaders and their teams with actionable insight into the threats we observe, techniques adversaries most commonly leverage, and trends that help you understand what is changing and why. This is our most expansive report to date, but our intention remains the same: The Threat Detection Report exists to help you understand and detect threats.

  • Start perusing the most prevalent techniques, trends, and threats to see what we’ve observed in our customers’ environments.
  • Explore how to detect, mitigate, and simulate specific threats and techniques.
  • Talk with your team about how the ideas, recommendations, and priorities map to your security controls and your overall strategy.
Access report
 
 
Back to Top