SS8, Inc.
SS8, Inc.
Blog Post
  • Throughout the year, every Friday the SS8 Twitter feed featured a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers and Threat Researcher Team take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. The start of [&hellip The post 2017 Breach of the Year appeared first on Breacher Report...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for December? This month’s breach threat [&hellip The post Breach of the Month, December 2017 appeared first on Brea...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for November? This month’s breach threat [&hellip The post Breach of the Month, November 2017 appeared first on Brea...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for October? This month’s breach threat [&hellip The post Breach of the Month, October 2017 appeared first on Breach...

SS8, Inc.
SS8, Inc.
Blog Post
  • Security Information and Event Management (SIEM) data is an invaluable source of information for hunting security threats. While there has been widespread adoption of SIEM tools in security operation centers, the massive amounts of log data and alert fatigue is challenging security professionals and resulting in threats being missed. This is also extending the time [&hellip The post Enriching McAf...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for September? This month’s breach threat [&hellip The post Breach of the Month, September 2017 appeared first on Br...

SS8, Inc.
SS8, Inc.
Blog Post
  • Unless you’ve been under a rock, you know that breaches continue to occur at an alarming rate. Despite massive investments in security technology, today’s organizations remain challenged to protect their infrastructure against the most advanced threats. The pendulum continues to swing in a cyber war between hackers and those defending critical systems. What’s the common [&hellip The post Five Indi...

SS8, Inc.
SS8, Inc.
Blog Post
  • If you follow the mobile technology space, you know that 5G is coming. The fifth generation of mobile network technologies, or 5G, is being rolled out for commercial launch in 2018, with trials already underway around the world.  One might ask why do we need 5G when it seems like we just moved to 4G? Answer – [&hellip The post Upcoming Webinar – 5G Revolution, Not Evolution appeared first on Breac...

SS8, Inc.
SS8, Inc.
Blog Post
  • I’m back reviewing the top breaches of the past month, and no better place to start than the Game of Thrones (GoT) breach. This is probably one of the most high-profile breaches of August. There are actually two separate security incidents associated with the highly popular TV series. It was mere coincidence that they occurred [&hellip The post Breach of the Month, August 2017 – Elections, and hot...

SS8, Inc.
SS8, Inc.
Blog Post
  • SC media names SS8's Cemal Dikmen as a winner of the 2017 Reboot Leadership award for his significant technical contributions to the security industry The post SC Media Awards SS8’s Cemal Dikmen appeared first on Breacher Report.

SS8, Inc.
SS8, Inc.
Blog Post
  • Looking for a Darktrace Alternative, and want to have a little fun? Play Darktrace vs SS8 Buzzword Bingo and start crossing-off the jargon that separates the SS8 approach from Darktrace. If you’re in the market for a network traffic analysis solution (NTA), you may have already had some exposure to our competitor Darktrace via a sales [&hellip The post Darktrace vs SS8 Buzzword Bingo appeared firs...

SS8, Inc.
SS8, Inc.
Blog Post
  • Gartner publishes Hype Cycle for Threat-Facing Technologies and SS8 is recognized as a sample vendor in the category of Network Traffic Analysis (NTA) The post Gartner Highlights Threat-Facing Technologies appeared first on Breacher Report.

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for July? This month’s breach threat [&hellip The post Breach of the Month – July 2017 appeared first on Breacher Re...

SS8, Inc.
SS8, Inc.
Blog Post
  • Simplicity. Quite possibly one of the most controversial topics in cyber security. One camp argues the shortage of cyber security expertise demands we need tools that limit the amount of time users spend looking at screens. The other side says too much ease-of-use leaves us potentially exposed by not having enough forensic visibility and control. [&hellip The post Darktrace vs. SS8 Part 2: Simplic...

SS8, Inc.
SS8, Inc.
Blog Post
  • Perception is everything in building a brand, and nothing helps build perception more than money. Enter our competitor Darktrace in the network traffic analysis (NTA) category, which for many, would appear to be dumping cash on the campfire to acquire new customers and build a brand for network-based threat detection. But for good reason. Case [&hellip The post Darktrace vs. SS8 Part 1: Detection ...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Lucky(?) for us, the month of June has been rife [&hellip The post Breach of the Month – June 2017 appeared first on Breacher Report.

SS8, Inc.
SS8, Inc.
Blog Post
  • It’s no Spoiler to note that cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you Game of Thrones fans, it’s a lot like Wildlings slipping past The Wall. Data breaches are going undetected for more than 200 days, and in most cases, [&hellip The post Much like Winter, Breaches are Coming! appeared first...

SS8, Inc.
SS8, Inc.
Blog Post
  • Coming off the heels of the Gartner Security and Risk Management Summit that was held in National Harbor, MD last week, a couple of things were abundantly clear: First, the noise-factor of security is off the charts with more than 200 sponsoring companies at the show (I’m sure this makes the Gartner sales folks happy). [&hellip The post Don’t Roll Your Eyes — Network Traffic Analysis Could be Key ...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for May? This month’s breach threat [&hellip The post Breach of the Month — May 2017 appeared first on Breacher Repo...

SS8, Inc.
SS8, Inc.
Blog Post
  • Let’s commence our Gone Phishing series by looking at the first technique – the Extension-Appending Attack. This phishing technique involves an attacker chaining together different types of file extensions. In most cases, this chain starts with an extension pertaining to different document types such as pdf or MS office formats like docx, pptx, xlsx, etc. [&hellip The post Avoiding Extension-Appen...

SS8, Inc.
SS8, Inc.
Blog Post
  • With the WannaCry ransomware still making global headlines, many IT teams are taking a hard look at their network protection. If your organization was one of the unlucky number hit by the notorious malware, you’re probably still reeling from the aftermath, and if you managed to escape it, you may be wondering when the next [&hellip The post Protecting Yourself From Ransomware Like WannaCry with SS...

SS8, Inc.
SS8, Inc.
Blog Post
  • The ransomware widely known as ‘WannaCry’ made headlines last week after its global spread, notably shutting down healthcare systems across the United Kingdom. Our researchers have taken a look at the infection, and now share their analysis and tips to avoid infection. The works: WannaCry/WannaCrypt/WCry propagates over SMB by leveraging the MS-17-010 RCE vulnerability. Once [&hellip The post Look...

SS8, Inc.
SS8, Inc.
Blog Post
  • Today’s post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T, Present CEO, TAG Cyber Collecting telemetry at line speed for analysis, management, and intelligence has always been a basic tenet of telecommunications security. Law enforcement also relies on these techniques to make our society safer and to create strong disincentives [&hellip The post Advanced Analytics for Investig...

SS8, Inc.
SS8, Inc.
Blog Post
  • Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for April? This month’s breach threat [&hellip The post Breach of the Month — April 2017 appeared first on Breacher ...

SS8, Inc.
SS8, Inc.
Blog Post

Gone Phishing

  • The cyber war currently being waged by ethical hackers and cyber criminals on multiple fronts — encompassing computer, network, and software vulnerabilities — tends to lean in either direction depending on who’s having a bad day. However, there is one attack technique where the bad guys have the upper hand: social engineering. The adage, “Humans [&hellip The post Gone Phishing appeared first on Br...

SS8, Inc.
SS8, Inc.
Blog Post
  • The network is the source of truth for uncovering both devices and suspects of interest. SS8’s unique ability to extract intelligence from network communications right up to the application layer has propelled SS8 to a breakthrough year in terms of revenue growth, customer acquisition and expansion into new markets. Today, we announced our record revenues [&hellip The post Network Intelligence Pow...

SS8, Inc.
SS8, Inc.
Blog Post
  • Network ports are entry points into your system, and understanding network infrastructure and hosted services helps to determine the ports that are expected to be open on the network. Any listening port that is unexpectedly open in your environment is a potential attack vector; that being said, adversaries have managed to interact over common ports [&hellip The post Network Ports can be Risky Busi...

SS8, Inc.
SS8, Inc.
Blog Post
  • It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in a customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What did SS8 BreachDetect Find? SS8 BreachDetect discovered numerous internal devices with active participation in an OpenCandy Adware Net...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.