Article Blog Image

What does "bad" look like in your network? - Emotet

Network Monitoring

A large number of events happen in your systems every day. In this article, we’ll examine what “bad” events show up in the network when the Emotet malware is executed in your systems.

The network traffic sample has been downloaded from malware-traffic-analysis.net. It is an excellent site to find different types of malwares and the corresponding traffic. The specific malware sample we will use in this article were collected originally by Palo Alto’s Unit42 Threat...

Article Blog Image

NTA has now become NDR

Network Monitoring

Obtaining visibility and deep insight into network traffic is something many organizations should focus on. The majority of all cyber-attacks leave a trail in network traffic. The network contains valuable information about threats here and now, as well as vulnerabilities. And as they say,

Packets Don't Lie.

However, the large amount of data that goes through the network makes it easier for hackers to hide their tracks and avoid...