Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Inside Out Security

Insights and analysis on cyber security, privacy, and data protection from the world’s leader in data-centric security.

Last Week in Microsoft Azure: Week of March 22nd

On March 15, 2021, Azure Active Directory experienced an outage lasting around 2 hours. The outage impacted Office 365 applications and access to the Azure Admin Portal. Microsoft posted a...

Read More

How to Use Autoruns to Detect and Remove Malware on Windows

Understanding how to use Autoruns means you may be able to detect if your home PC is infected with unwanted software. Note: This article is intended to illustrate how malware...

Read More

Watch: ReConnect – Ways Attackers Sidestep Your Endpoints

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

Read More

PowerShell Variable Scope Guide: Using Scope in Scripts and Modules

PowerShell uses variables to store information that can be useful later on. Variables also make it easy to change values in multiple places by changing the variable’s definition. You can...

Read More

Threat Update 30 – No trust? No problem! An Overview of Zero Trust

With the constant barrage of cyberattacks in the news, it would be natural to wonder if there’s a security model to help. Enter Zero Trust! This popular security model has...

Read More

How APTs Use Reverse Proxies to Nmap Internal Networks

Reverse proxies allow adversaries (APTs) to pivot attacks into secured environments, as they’re capable of bypassing inbound firewall restrictions. In recent news, a federal agency’s enterprise network was the victim...

Read More

Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign

Our team has recently led several high-profile investigations of attacks attributed to an up-and-coming cybercrime group, Darkside. These highly targeted campaigns were conducted in several phases over weeks or months,...

Read More

How to Unpack Malware with x64dbg

In a previous blog post, I explained what x64dbg is and also broke down some of the features of the tool and why they are useful for malware analysis. This...

Read More

Your Complete HIPAA Compliance Checklist for 2021

The Health Insurance Portability and Accountability Act (HIPAA) is as important to the healthcare industry now more than ever — if not more. Hospitals, insurance companies and healthcare providers all...

Read More

Threat Update 29 – Exchange Vulnerability Detection Tips & Tools

Many organizations are still dealing with the mass exploitation of on-prem Exchange servers from four Zero-Day vulnerabilities. Teams are struggling to identify and patch all of their affected servers, and...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.