CRA was engaged by a global data processing company to perform a compromise assessment after a large competitor suffered a widely publicized breach. CRA obtained endpoint visibility and performed threat hunting across the environment. CRA found several instances of malware as well as shortcomings in the environment’s security posture such as unmanaged assets and outdated software. The client was quickly able to remove the malware from their environment, update the outdated software, and improve their security posture.
#Whack-a-mole: Challenges in social media investigative research
In this CRA Insights, Victor Epstein reflects on how social media can be leveraged to gather insights into an individual’s movements, comments, associates, and...