Category: Webinar

Fully automating EDR/XDR alert validation using older hooking or kernel-mode sandbox technologies can disrupt SOCs and stall submission queues. In high-volume alert environments such as an Enterprise or MDR SOC, the time and resources spent identifying EDR alert false positives and manually triaging “suspicious” or benign malware samples that fail

Tired of limited security options for Linux OS? As Linux continues to be a prime target for cyber threats, the need for cutting-edge defenses has never been more critical. Watch this webinar to discover how our new malware sandboxing feature, offering both static and dynamic analysis capabilities, gives you a

In this webinar recording learn how malware and phishing false positives impact your SOC Team. The VMRay Team discusses the ups and downs of EDR and XDR deployments from a financial loss and resource impact perspective and how VMRay can help reduce false positives by up to 90% using automation.

Watch this on-demand webinar as we delve into the intricate world of BumbleBee, a malicious loader that stormed onto the threat landscape in early 2022. Since its inception, BumbleBee has been involved in numerous cyberattacks, delivering harmful payloads from known malware families. It has consistently showcased its ability to evolve

Email gateways and perimeter phishing solutions do a good job of detecting the bulk of inbound threats, but sometimes the analysis results are inconclusive. A small percentage of malicious and damaging emails still manage to get through into the enterprise to finish up in end-user inboxes. In large Enterprises, many

[SANS Webcast] The Real “F-Word” Understanding the Source of False Positives from EDR Systems & How to Ease the Pain False positives can be overwhelming. With a finite number of hours in the day and a limited amount of resources, it’s a daily challenge to validate the vast number of

VMRay x VMWare Cloud EDR Connector VMWare Carbon Black Cloud can upload all new binaries it detects to the cloud Universal Binary Store (UBS) so that nothing is missed during the investigation even if original malware or hacking tools were later deleted by intruders. All these new files may be

Uncover the truth of Cybersecurity, one story at a time

Keep up to date with our weekly digest of articles. Get the latest news, invites to events, and threat alerts!

Subscribe to our Newsletter