Published inEclecticIQ Blog·Mar 20Enabling File Integrity Monitoring on Windows with Osquery and EclecticIQ Endpoint ResponseFile Integrity Monitoring (FIM) is a security control that helps organizations ensure the integrity of their files and systems by monitoring changes to files and directories. FIM is an important security control needed for almost all kinds of compliance requirements, like PCI DSS, HIPAA, GDPR and ISO. The aim of…Edr6 min readEdr6 min read
Published inEclecticIQ Blog·Feb 28If Infosec Was a Supermarket BusinessBy Jordan Durham I was recently reading an article which made a brief analogy between cybersecurity and a retail store. This got me thinking — could there be a deeper analogy made for cybersecurity and a supermarket, especially detection and response programs? I strongly believe that awareness is one of…Mssp And Mdr13 min readMssp And Mdr13 min read
Published inEclecticIQ Blog·Feb 7Why MSSPs Must Go Beyond Pure Efficiency to Deliver Value in CybersecurityToday’s managed security service providers (MSSPs) are faced an eternal struggle when it comes to their customers. They must be able to provide a sufficient level of value while at the same time maintaining operational efficiency. This balancing act isn’t easy, especially since focusing on one side will have major…Mssp4 min readMssp4 min read
Published inEclecticIQ Blog·Jan 5Compliance Does Not Equal CybersecurityHIPAA, GDPR, PCI, CIS, NIST. Does any of those acronyms sound familiar? Chances are, you’ve heard of several and have a general understanding of what they’re all about. …Malware7 min readMalware7 min read
Published inEclecticIQ Blog·Dec 29, 2022Data Philosophy and Technology Combine for Better Endpoint SecurityRussel Ackoff was the one of first to define a hierarchy from data to wisdom (1). In Ackoff’s words: “Data are symbols that represent the properties of objects and events. Information consists of processed data, the processing directed at increasing its usefulness. For example, census takers collect data. The Bureau…Malware5 min readMalware5 min read
Dec 28, 2022Comparing Sysmon and EclecticIQ Endpoint Response — Event FiltersComparing Sysmon and EclecticIQ Endpoint Response — Event Filters For effective information monitoring, modern security software uses sensors that generate various data types depending on the monitoring purpose. A sensor collects data and information for the attached system and to ensure a sensor system or network of sensors is effective, the noise that accompanies the collected data must first…5 min read5 min read
Published inEclecticIQ Blog·Dec 13, 2022Hunting Emotet Made Easy with EclecticIQ Endpoint ResponseEarlier this year, EclecticIQ Analysts published this article detailing the inner workings of a newly observed Emotet variant. In November, another industry source published a report talking about the resurgence of Emotet after a hiatus. The report describes how Emotet is activated after remaining dormant to obfuscate the infection. The…Corporate5 min readCorporate5 min read
Published inEclecticIQ Blog·Nov 23, 2022Member-onlyUsing Log Parsing to Stop Microsoft IIS Backdoor AttacksChances are you’ve heard of Microsoft’s Internet Information Services, (more commonly known as IIS) as it’s one of the most popular web servers in the world, boasting a user base of over one million websites and included in the tech stack of nearly 6,000 companies. …Corporate7 min readCorporate7 min read
Dec 22, 2020Member-onlyQAnon Conspiracies Show Organic Growth Capability with Multi-layered Digital InfrastructureQAnon infrastructure and Modus Operandi drive a horizontally controlled, organically self-sustaining user community. …Qanon8 min readQanon8 min read
Nov 9, 2020Member-onlyTen Years Later, EclecticIQ Examines Evolution of Stuxnet-like AttacksStuxnet malware was reportedly a US-Israel joint enterprise against a critical infrastructure target. The main payload was allegedly introduced on a USB device by an insider threat working for the AVID, via supply-chain compromise. Stuxnet was an original malware tailored to cause ICS (Industrial Control System) connected systems to malfunction…Stuxnet6 min readStuxnet6 min read