Blog QOMPLX Knowledge: Detecting PowerShell Encoded Command Execution We take a look at how QOMPLX’s technology helps customers to spot the use of encoded commands in conjunction with the PowerShell utility.
Blog QOMPLX Knowledge: Detecting PowerShell Executed in the Background In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot attackers efforts to hide their use of PowerShell by running it in the background of another application.
Blog QOMPLX Knowledge: Detecting Successful Zone Transfer from an Unknown Source In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot one technique for foot-printing target environments: DNS zone transfers.
Blog QOMPLX Knowledge: Detecting Account Name Enumeration We take a look at how QOMPLX’s technology helps customers to spot malicious account enumeration activity, which often is an early indication that an attack is taking place.
Blog QOMPLX Knowledge: Detecting Password Spraying Attacks In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot password spraying attacks and other excessive login attempts that are often an early indication that an attack is taking place.
Blog QOMPLX Analysis: Refracting Cyber Risks For Accellion Customers What started off as attacks on Accellion FTA customers evolved into an epidemic of data breaches and then a plague of “doxing” and cyber extortion. And the worst is almost certainly not behind us.