Request a Demo Cybersecurity Assessment Latest Trellix Events Contact Us

News & Blogs

Keeping you informed

RECENT STORIES

Cybercrooks leveraging anti automation toolkit for phishing campaigns

Cybercrooks Leveraging Anti Automation Toolkit For Phishing Campaigns

For a long time, our team has tracked the exploitation of Github’s anti-automation tool “Predator,” collecting samples of phishing attempts in the wild and analyzing the attack flow and evasion techniques used.

Read More

Detecting and Visualizing Lateral Movement Attacks with Trellix XDR

Detecting and Visualizing Lateral Movement Attacks with Trellix XDR

In this blog, we present multiple attack scenarios focused on lateral movement, including abuse of weak service permissions to execute code, dumping and exfiltrating credential material from Active Directory.

Read More

A CISO’s Best Friend: Trellix Service Delivery Managers

A CISO’s Best Friend: Trellix Service Delivery Managers

At Trellix, we know how tough it can be for CISOs to manage technology transitions, maintain tool effectiveness, and constantly update your team’s skill-set. Let’s meet some of the Trellix leaders who understand these challenges the best, because they execute on them every single day.

Read More

Scanning Danger: Unmasking the Threats of Quishing

Scanning Danger: Unmasking the Threats of Quishing

In this blog, we explore the modus operandi of threat actors utilizing QR code attacks, by examining recent and widespread quishing campaigns detected by Trellix.

Read More

The Symbiont Attacks: An Insider Threat

The Symbiont Attacks: An Insider Threat

Is your organization’s data protected from an Alien Symbiont attack? In this episode we’ll dive into how the National Superhero Keeper Agency developed a unique use case to defend against an Insider Threat.

Read More

Get the latest

We’re no strangers to cybersecurity. But we are a new company.
Stay up to date as we evolve.

Please enter a valid email address.

Zero spam. Unsubscribe at any time.