SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach of the Month – June 2017
    Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Lucky(?) for us, the month of June has been rife [&hellip The post Breach of the Month – June 2017 appeared first on Breacher Report.
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Much like Winter, Breaches are Coming!
    It’s no Spoiler to note that cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you Game of Thrones fans, it’s a lot like Wildlings slipping past The Wall. Data breaches are going undetected for more than 200 days, and in most cases, [&hellip The post Much like Winter, Breaches are Coming! appeared first...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Don’t Roll Your Eyes — Network Traffic Analysis Could be Key
    Coming off the heels of the Gartner Security and Risk Management Summit that was held in National Harbor, MD last week, a couple of things were abundantly clear: First, the noise-factor of security is off the charts with more than 200 sponsoring companies at the show (I’m sure this makes the Gartner sales folks happy). [&hellip The post Don’t Roll Your Eyes — Network Traffic Analysis Could be Key ...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach of the Month — May 2017
    Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for May? This month’s breach threat [&hellip The post Breach of the Month — May 2017 appeared first on Breacher Repo...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Avoiding Extension-Appending Attacks
    Let’s commence our Gone Phishing series by looking at the first technique – the Extension-Appending Attack. This phishing technique involves an attacker chaining together different types of file extensions. In most cases, this chain starts with an extension pertaining to different document types such as pdf or MS office formats like docx, pptx, xlsx, etc. [&hellip The post Avoiding Extension-Appen...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Protecting Yourself From Ransomware Like WannaCry with SS8 BreachDetect
    With the WannaCry ransomware still making global headlines, many IT teams are taking a hard look at their network protection. If your organization was one of the unlucky number hit by the notorious malware, you’re probably still reeling from the aftermath, and if you managed to escape it, you may be wondering when the next [&hellip The post Protecting Yourself From Ransomware Like WannaCry with SS...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Looking back at WannaCry
    The ransomware widely known as ‘WannaCry’ made headlines last week after its global spread, notably shutting down healthcare systems across the United Kingdom. Our researchers have taken a look at the infection, and now share their analysis and tips to avoid infection. The works: WannaCry/WannaCrypt/WCry propagates over SMB by leveraging the MS-17-010 RCE vulnerability. Once [&hellip The post Look...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Advanced Analytics for Investigations and Enterprise Security
    Today’s post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T, Present CEO, TAG Cyber Collecting telemetry at line speed for analysis, management, and intelligence has always been a basic tenet of telecommunications security. Law enforcement also relies on these techniques to make our society safer and to create strong disincentives [&hellip The post Advanced Analytics for Investig...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach of the Month — April 2017
    Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’ and select one outstanding breach as our #BreachOfTheMonth pick. Which did we choose for April? This month’s breach threat [&hellip The post Breach of the Month — April 2017 appeared first on Breacher ...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Gone Phishing
    The cyber war currently being waged by ethical hackers and cyber criminals on multiple fronts — encompassing computer, network, and software vulnerabilities — tends to lean in either direction depending on who’s having a bad day. However, there is one attack technique where the bad guys have the upper hand: social engineering. The adage, “Humans [&hellip The post Gone Phishing appeared first on Br...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Network Intelligence Powers Hunt for Devices and Suspects of Interest
    The network is the source of truth for uncovering both devices and suspects of interest. SS8’s unique ability to extract intelligence from network communications right up to the application layer has propelled SS8 to a breakthrough year in terms of revenue growth, customer acquisition and expansion into new markets. Today, we announced our record revenues [&hellip The post Network Intelligence Pow...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Network Ports can be Risky Business
    Network ports are entry points into your system, and understanding network infrastructure and hosted services helps to determine the ports that are expected to be open on the network. Any listening port that is unexpectedly open in your environment is a potential attack vector; that being said, adversaries have managed to interact over common ports [&hellip The post Network Ports can be Risky Busi...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Taking OpenCandy from a Baby
    It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in a customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What did SS8 BreachDetect Find? SS8 BreachDetect discovered numerous internal devices with active participation in an OpenCandy Adware Net...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach of the Month — March 2017
    If you follow the SS8 Twitter feed, you’ll know that every Friday we select a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. But we also select from these ‘finalists’ to choose a single outstanding breach each month — which was the one we chose as the March #breachofthemonth? This month’s [&hellip The post Breach of the Month — March 2017 appeared first on Breacher Report.
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Focusing on the Evolving Threat Landscape at SecureCISO
    Most companies list cyber security as one of their top priorities. Many have implemented various technologies and increased headcount to protect their digital assets and comply with regulations. However, despite making these investments, they continue to struggle with identifying a breach and knowing what to do or how to respond when it happens. Today, SS8 [&hellip The post Focusing on the Evolvin...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Blacklisted Shell Games
    It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in the customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What Did SS8 BreachDetect Uncover? One of the key discoveries uncovered was: SSH Sessions from blacklisted threat actors SS8 BreachDetec...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach of the Month — February 2017
    Every week on our Twitter stream we share news on the top breaches making the headlines. At the end of each week one ‘unlucky winner’ — the largest, the weirdest, the most dangerous, or the most high-profile — is chosen as the SS8 #breachoftheweek. But out of all the February breaches we chose for the [&hellip The post Breach of the Month — February 2017 appeared first on Breacher Report.
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Forrester’s Vendor Landscape: Security Analytics Report Shows Security Logs Aren’t Enough
    According to Forrester’s most recent Vendor Landscape: Security Analytics (SA) report, “SA solutions promise to detect cyber threats and enable security teams to respond before they cause a data breach.” As outside threats continue to evolve, it’s no longer enough for Security Information Management tools to simply log events — increasing pressure on enterprise security [&hellip The post Forrester...
  • RSAC 2017 – a View from the Floor
    The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key management, risk and crisis management, and biometrics. The entire conference was massive, taking place over 5 days with venues [&hellip...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Threat, Breach, Risk… Watch The SS8 RSA 2017 Recap
    The SS8 team is still fired up from our great experiences at the 2017 RSA conference last week. In this video recap, SS8 president and COO Faizel Lakhani discusses the trends and findings from one of the cybersecurity industry’s top events. He examines the challenges enterprises face today and how the network is critical to [&hellip The post Threat, Breach, Risk… Watch The SS8 RSA 2017 Recap appea...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • The Hello Kitty Data Breach – a Deeper Look
    Earlier this month we chose the Hello Kitty breach as the ‘winner’ of 2017’s first Breach of the Month. Why did we choose this particular data leak from the other January contenders? We’d like to outline the 2 major reasons we selected this particular breach: the nature of the data stolen, and some of the [&hellip The post The Hello Kitty Data Breach – a Deeper Look appeared first on Breacher Repo...
  • Welcome to our Improved BreachDetect Dashboard
    Analysts — how is your breach detection workflow? Do you struggle to sift through reports to find insights into suspicious network activity? If you’re like most security pros, chances are you’d benefit from a system which allows you to quickly sort through key threat indicators to find detailed information on any surfacing indicators of compromise. [&hellip The post Welcome to our Improved BreachD...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • SS8 BreachDetect Uncovers Breaches without Forensics Expertise
    We have introduced the latest version of BreachDetect, which makes advanced threat detection and investigation capabilities easily accessible to enterprise security and IT administrators. This latest release of BreachDetect tilts the balance in favor of enterprises with an intelligence-agency grade solution for detecting the most advanced threats, without the need for security analyst training. Wa...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Visualizing the Kill Chain without Forensics Expertise
    Two things we should all know by now: attacks continue to hit our networks despite preventative defenses, and there’s a shortage of resources available to hunt them down. That changes today with the latest release of BreachDetect, our time machine for breach detection, which makes advanced threat detection and investigation capabilities easily accessible to enterprise [&hellip The post Visualizing...
  • Breach Happens Podcast #5 – January’s Breach of the Month
    In Episode Five of the Breach Happens podcast, SS8 Threat Analyst Akshay Nayak joins host Tony Thompson to choose our Breach of the Month winner for January 2017. You can help us nominate breaches throughout the month using the hashtag #breachoftheweek. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens [&hellip The post Breach Happens Podcas...
  • Breach of the Month — January 2017
    While everyone likes to win, this is an award you don’t want. Each week we choose a breach as our #breachoftheweek for our Twitter stream, and those become nominees for SS8’s “Breach of The Month”. Think of it as our team’s very own Raspberry Awards!  Analyses of the Breach of the Week winners are provided [&hellip The post Breach of the Month — January 2017 appeared first on Breacher Report.
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Breach Happens Podcast #4 – Packet Recorders
    In Episode Four of the Breach Happens podcast, SS8 Sales Engineer Andrew Weisman joins host Tony Thompson to discuss the good, the bad, and the ugly of packet recorder technology. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag #breachhappens — we’d love to hear your thoughts. Listen to the [&hellip The post Breach Happens Podcast #4 – Packet Recorders a...
  • Help Wanted: Packet Inspection Capabilities
    Help wanted: A security tool that understands packets, gives full network visibility and hunts for breaches. Must be easy-to-use and work well with others. Willing to work nights, weekends and holidays. Sure, I’m being a bit cheeky here, but when you think about 99% of bad things being seen on the network, the need for [&hellip The post Help Wanted: Packet Inspection Capabilities appeared first on...
  • Breach Happens Podcast #3 – 2016 Threat Rewind Report
    In Episode Three of the Breach Happens podcast, SS8 COO and President Faizel Lakhani joins host Tony Thompson to discuss and review the findings in the recently released 2016 Threat Rewind Report. Key themes include bittorrent, traffic tunneling, and non–essential devices. Come join the conversation! Follow us on Twitter @SS8 and send us a tweet using the hashtag [&hellip The post Breach Happens P...
  • I.O.T. Phone Home
    The creation of our 2016 Threat Rewind Report, which we released last month, was intended to help educate and better-prepare today’s enterprises about the most sophisticated attack techniques hiding in today’s networks and evading preventative cybersecurity defenses. Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect [&he...
  • Breach Happens Podcast #2 – Dear Netflow…
    It’s not you, it’s me. Well, it is you NetFlow. We’ve had some good times, but I don’t feel like you’re meeting my needs anymore. So I think it’s time we broke up. In Episode Two of the BreachHappens podcast, NetFlow tries hard to get a security analyst back, but she’s moved on and lets [&hellip The post Breach Happens Podcast #2 – Dear Netflow… appeared first on Breacher Report.
  • Top Cyber Security Evasion and Exfiltration Techniques Exposed
    Over the past year, SS8 has conducted breach detection risk assessments on live production networks, using the SS8 BreachDetect platform, for companies in key industries including critical infrastructure, retail, and education. We’ve analyzed a whopping five billion high-definition records (HDRs) from a variety of environments, and from that, have now published what we refer to as [&hellip The pos...
  • Forrester Spotlights Security Analytics Vendor Landscape
    Forrester recently published its Vendor Landscape: Security Analytics (SA)[1] report, and there’s one theme we believe resonates more than any: Network visibility and insight is key to responding quickly to breaches that have slipped past your preventative measures. (If you’re a Forrester client, you can download the full report here.) According to the report, authored [&hellip The post Forrester ...
  • Not So SIEMple: 3 Things to Keep in Mind Before Falling into SIEM Reliance
    While many enterprise organizations are now relying on log data to answer the what, when, how, and why of a breach, the reality is that despite your team’s best efforts, more advanced threats will still slip past traditional preventative security tools and can hide on the network for an average of 200 days. This makes [&hellip The post Not So SIEMple: 3 Things to Keep in Mind Before Falling into S...
  • Breach Hunting: Simplified
    It’s no secret that the network is the key to finding breaches. 99% of breaches still occur over the network despite our best efforts to prevent them. When a breach slips onto the network, the best way to catch it quickly is with total network visibility. SS8 BreachDetect employs this concept to give you a [&hellip The post Breach Hunting: Simplified appeared first on Breacher Report.
  • Doubling-Down on Breach Detection at RSA 2017
    It’s that time of year again, the time when the cybersecurity industry convenes in San Francisco for the annual RSA Conference. What’s not to love if you’re a security pro: lots of top tech in one place, surrounded by peers you can learn from, security leaders sharing ideas, and of course, the parties. It shouldn’t [&hellip The post Doubling-Down on Breach Detection at RSA 2017 appeared first on B...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • HDRs optimize Rule-Based and Machine Learning Classification of Network Breaches
    SS8 has developed High-Definition Records (HDRs) as an answer to the lack of total network visibility that most enterprises face today. These HDRs provide more detailed information than NetFlow records by adding Application Level Metadata, such as the “To:” or “From:” field in an email to the record, and even include User Identity information. High-Definition [&hellip The post HDRs optimize Rule-B...
SS8, Inc.
SS8, Inc.
Blog Article

New blog articles detected.

  • Advising the Commission on Enhancing National Cybersecurity: Isn’t it all about the Network?
    The Commission on Enhancing National Cybersecurity (Executive Order 13718) has requested information about current and future states of cybersecurity in the digital economy. The Commission solicited input through a public Request for Information, and SS8 has recently provided our comments. This is a notable effort, and we thank the Commission for taking our comments. In [&hellip The post Advising ...
  • Time for a Defensive Change in Cyber
    Today’s post was written by Dr. Edward G. Amoroso, Former SVP and CSO of AT&T, Present CEO, TAG Cyber One of the conundrums facing the modern enterprise security team involves what to do about the ineffectiveness of the perimeter. Everyone agrees that unauthorized entry through open ports or advertised services in a leaky firewall has [&hellip The post Time for a Defensive Change in Cyber appeared...
SS8, Inc.
SS8, Inc.
Blog Article

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.