Speed Matters: The Crucial Role of MTTD and MTTR in Cybersecurity
Cybersecurity is a fast-paced world, and when we talk about it, two important measurements often come up: how quickly we can spot a problem (Mean Time to Detect or MTTD) and how fast we can fix it...
View ArticleReal Time Feedback: Fine-Tuning Autonomous SOC to Your Environment
Continuous improvement is a requirement in the ever-evolving cybersecurity space. That’s why Intezer is excited to introduce a new feature in the Autonomous SOC platform: a real-time feedback...
View ArticleInteractive Browsing: A New Dimension to URL Analysis
We’re excited to announce a new feature in Intezer that revolutionizes how security teams analyze and interact with URLs: Interactive Browsing. Interactive Browsing, powered by our partnership...
View ArticleHow Artificial Intelligence Powers the Autonomous SOC Platform
A few years ago leading cybersecurity professionals and industry analysts were publicly saying that even with advances in artificial intelligence and machine learning, the “Autonomous SOC” was an...
View Article.NET Malware 101: Analyzing the .NET Executable File Structure
Welcome to our deep dive into the world of .NET malware reverse engineering. As a security researcher or analyst, you’re likely aware that the .NET framework, famed for its ability to enable rapid and...
View ArticleThe Ultimate Guide to CrowdStrike Falcon LogScale: A Next-Gen SIEM Showdown
As security teams rethink how they handle incident triage and look to adopt powerful artificial intelligence tools for their SOC in 2024, many are considering if it’s time to make the switch to a...
View ArticleMSSPs and MDRs Moving Fast to Adopt AI-Powered Automation
Read more in the press release about the official launch of Intezer for MSSP, an AI-powered solution for services providers to leverage the Autonomous SOC Platform. In the cybersecurity landscape of...
View ArticleMemory Analysis 101: Understanding Memory Threats and Forensic Tools
Memory forensics is an important part of incident response and threat analysis, as new threats and sophistication emerge in the evolving cybersecurity landscape. Unlike traditional methods focusing on...
View ArticleMastering SOC Automation in 2024: Tips, Trends and Tools
Navigating the array of SOC automation tools and trends can be overwhelming, with new artificial intelligences technologies emerging at a rapid pace in 2024. This dynamic environment underscores the...
View ArticleDissecting SSLoad Malware: A Comprehensive Technical Analysis
SSLoad is a stealthy malware that is used to infiltrate systems through phishing emails, gather reconnaissance and transmit it back to its operators while delivering various payloads. Recently, Unit42...
View ArticleHow to Analyze Malicious MSI Installer Files
Threat actors choose to use MSI installers to deliver and execute malicious payloads because these files can embed harmful executables and scripts within legitimate-looking packages, evading...
View ArticleThere’s Something About CryptBot: Yet Another Silly Stealer (YASS)
Recently Intezer was investigating a file that we came across during alert triage. This particular file piqued our interest due to the interesting delivery chain, and the even more interesting...
View ArticleAI in Action: Top 4 Ways Security Teams Can Leverage AI Today
Artificial intelligence (AI) has become an indispensable tool for security teams in today’s fast-paced cybersecurity landscape. From detecting threats to automating routine tasks, AI has already and...
View ArticleA $33M Investment to Extend SOC Teams’ Capacity
At Intezer, we’ve always had a singular focus: helping security teams succeed in the face of resource constraints and talent shortages. After spending years in the field myself, I know what it’s like...
View ArticleTechnical Analysis of a Novel IMEEX Framework
The IMEEX framework is a newly discovered, custom-built malware designed to target Windows systems. Delivered as a 64-bit DLL, it offers attackers extensive control over compromised machines. This...
View ArticleHow AI Can Help with Security Alert Correlation
As cybersecurity threats grow more complex, the volume of alerts facing security teams has skyrocketed, putting a strain on security operations. Managing these alerts effectively is crucial for timely...
View ArticleBabble Babble Babble Babble Babble Babble BabbleLoader
Loaders, an Ever Evolving Market. The pace of innovation and development in the malware detection market is relentless, the same goes for the development of malware itself. Constantly charging and...
View ArticleDigging Deep: Interactive Sandboxing for Investigating Reported Phishing Emails
TL;DR – Intezer’s Autonomous SOC is transformative for phishing email investigations Phishing attacks are increasingly sophisticated, making quick and accurate triage essential. Intezer’s Autonomous...
View ArticleIs Agentic AI the New Cybersecurity Buzzword for 2025?
TL;DR: Yes, and there’s a good reason that agentic AI is getting buzz in the cybersecurity space. Agentic AI has the potential to address critical gaps in cybersecurity operations, particularly in...
View ArticleIntezer’s Autonomous SOC Platform Now Available in the Microsoft Azure...
Customers can now access Intezer’s platform through the Microsoft Azure Marketplace, enhancing their security operations with automated alert triage and rapid threat response NEW YORK – Intezer, a...
View Article