Armor, a cybersecurity disrupter, further invests in cloud native MDR+ offering with new Head of Global Sales, Derek Boxdell. Armor, the global cloud-native managed detection and response (MDR) leader, announces that Derek Boxdell has joined the Armor leadership team as the new Head of Global Sales. Derek is an Armor alum and returns to continue his trailblazing career in cloud security. Most recently Derek […]
January 31st, 2022 – Armor, the global cloud-native managed detection and response (MDR) leader, announces a bold and revolutionary model for securing customer environments that eliminates the challenges inherent in traditional approaches. Armor’s new offerings leverage cloud-native cybersecurity platforms and IP sharing to unlock companies from traditional solutions while aligning to their digital transformation journey. […]
In this report, Armor's Amer Elsad will dive deep and explore Grief operation and development since it was first observed in July 2017 as BitPaymer, as well as compare the different variants and partnerships with other threat actors and ransomware groups Download Report
Bah Humbug – Nasty Active Directory Exploits Call for Immediate Patching New attacks reinforce importance of rigorous updates in wake of Log4Shell As the Log4j threat continues to unfold, there is yet another “humbug” that should be top-of-mind for businesses as we enter the throes of the holiday season. The Armor team is closely monitoring […]
Within a matter of days, the vulnerability to Log4j (versions 2.0 to 2.14.1), which provides Java library logging capabilities sent shockwaves through the corridors of businesses from the boardroom to the data center. The zero-day attack known as “Log4Shell” (CVE-2021-44228) is concerning on a number of fronts that differ from previous high-profile attacks. The sheer […]
Armor’s cybersecurity and compliance assessment delivers a baseline assessment for your organization’s overall cybersecurity and compliance posture. The review provides a picture of your organization’s existing approach for “people, process, and technology,” a recommendation on what is needed to combat threats facing your organization, and, finally, a path to reaching your desired state of maturity. […]
We’re continuing our blog series about Living-off-the-Land (LotL) attacks by focusing on a particularly fast-moving malware called Astaroth. Click here to view the first post, which goes into the characteristics of LotL binaries and how they work. First spotted in the wild in 2017, Astaroth is a highly prevalent, information-stealing Latin American banking trojan. It […]
Cyber trends tend to come and go, but one popular technique we’re seeing currently is the use of living-off-the-land binaries. The concept of “living off the land” (LotL) was first introduced by Christopher Campbell and Matt Graeber at Derbycon 3.0 (2013) and refers to attacker behavior when they use any binary supplied by the operating […]
DALLAS — Oct. 26, 2021 — Armor, the global cybersecurity company for managed service providers (MSPs), was honored with a Global InfoSec Award for “Most Innovative in Compliance” by Cyber Defense Magazine (CDM). In its ninth year, the awards honor a range of organizations, including startups, early/late-stage, and public companies as evaluated by a panel of certified cybersecurity […]
This white paper looks at the types of tools, people, and financial resources needed to operate a highly functioning SOC, and the qualities needed for either an in-house or outsourced SOC to be effective.