Experience the ultimate flexibility with the Isolation API, allowing you to securely Quisque pellentesque id ultrices lacus ornare elit vitae ullamcorper. Learn More

Incident response

Latest blogs

Topic : Incident response
  • --Any--
  • Cyber threat intelligence
  • Incident response
  • OSINT
  • Managed attribution
  • Dark web
  • Intel and evidence
  • Web isolation

Safely investigate phishing sites without getting hooked

Phishing sites commonly contain malicious content that can put SOCs and their organizations at risk as they conduct investigations. But…

Mitigating risk in SOC investigations with managed attribution

Cloud-based web isolation neutralizes cyberthreats in employees’ everyday web activity — but how do SOCs secure their own online…

generia blog

New Silo-Splunk integration for SOCs automates log correlation

New Silo for Safe Access feature provides Splunk integration for SOCs to monitor employee web and SaaS app access on any device, managed or…

generia blog

Incident response to APTs: stop data loss, maintain connectivity, find the adversary

When performing incident response to APTs, balance priorities of fully rooting out adversaries and limiting disruption to the business.

generia blog

vBulletin 5: zero-day from imperfect patch

Popular forum software platform vBulletin faced a brand new remote code execution zero-day vulnerability. The culprit: an imperfect patch…

generia blog

Handbook: Tools, tips and tricks for threat hunters

A new manual published by Authentic8 helps threat hunters fill critical gaps and hone their tradecraft.

generia blog

Quick guide: how to use Shodan

You may have heard about Shodan on the evening news — as the webcam search engine of choice for creeps and criminals. What doesn'…

generia blog

Research: More worries with Wasm

In many web browsers, the WebAssembly programming language is taking over execution tasks that were once exclusively the domain of…

Blog updates

Stay updated with the latest posts from the blog
Close
Close