Contact Sales

endpoint security blog

Final-Connect-Image.jpg

Exposing Attacker Activity

This video post is one in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform. Today, CounterTack’s Nenad Kreculj exposes some tactics cyber attackers use to hide their actions.

Read More

Topics: Cyber Security, virtual machine introspection, Cyber attack intelligence, Event Horizon

How Hackers Hide Their Tracks: Part 1

This is the first in a series of technical blog posts examining various attack scenarios through video simulations of CounterTack’s Event Horizon platform.   

Read More

Topics: APT, virtual machine introspection, Detecting in-progress attack, Event Horizon

Subscribe to Email Updates

Recent Posts

Posts by Topic

see all