Article Blog Image

Announcing our NDR Platform, Derant Angle

Network Monitoring

We don’t believe in AI when It comes to detect skilled adversaries in the network.

That’s why we have developed Derant Angle, a Network Detection and Response platform (NDR), which we launch to the public today.

Based on our many years of experience as defenders, we see the need for transparency and insight into the basic data you use in daily security operations. Often, we have seen a lot of noise and systems don’t allow...

Article Blog Image

Targeted phishing past defender

Network Monitoring

Incident with unknown and undetected malware

Responding to an alert at one of our customers we came across the following incident.

The customer was phished with a seemingly targetted phishing attack back in late April through the site diymania[.]eu (behind cloudflare) (URL: hxxp://diymania[.]eu/hvilke-fordele-er-der-ved-bredygtig-energi.html (dead now)). The original link was most probably delivered through a mail to the user (not recovered).

Article Blog Image

Only a single client machine was affected....

Article Blog Image

What does "bad" look like in your network? - Emotet

Network Monitoring

A large number of events happen in your systems every day. In this article, we’ll examine what “bad” events show up in the network when the Emotet malware is executed in your systems.

The network traffic sample has been downloaded from malware-traffic-analysis.net. It is an excellent site to find different types of malwares and the corresponding traffic. The specific malware sample we will use in this article were collected originally by Palo Alto’s Unit42 Threat...

Article Blog Image

NTA has now become NDR

Network Monitoring

Obtaining visibility and deep insight into network traffic is something many organizations should focus on. The majority of all cyber-attacks leave a trail in network traffic. The network contains valuable information about threats here and now, as well as vulnerabilities. And as they say,

Packets Don't Lie.

However, the large amount of data that goes through the network makes it easier for hackers to hide their tracks and avoid...