Announcing Red Canary MDR for Cisco Duo The Red Canary Blog: Information Security Insights 2 days 3 hours ago Pair Duo’s trusted access security with Red Canary’s 24/7 expert MDR to stop identity attacks before they disrupt your business. Kelly Horsford
Red Canary named a Leader in G2’s Summer 2025 MDR Reports — #1 in enterprise customer satisfaction The Red Canary Blog: Information Security Insights 1 week ago A Leader in G2’s Summer 2025 Grid®, Enterprise Grid®, and Mid-Market Grid® Reports for MDR, Red Canary ranked #1 in enterprise customer satisfaction. Faith Wenger
Red Canary CFP tracker: July 2025 The Red Canary Blog: Information Security Insights 1 week 1 day ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: June 2025 The Red Canary Blog: Information Security Insights 1 week 5 days ago Mocha Manakin, malvertising, and social engineering trends: Catch up on the last month's episodes of Red Canary Office Hours.
Contain identity threats automatically with Red Canary and Microsoft Entra ID The Red Canary Blog: Information Security Insights 1 week 6 days ago Red Canary’s expanded integration with Microsoft Entra ID facilitates rapid response to identity threats with help from expert AI agents Alex Spiliotes
Email bombs and fake CAPTCHAs: A social engineering survival guide The Red Canary Blog: Information Security Insights 2 weeks 1 day ago Educate yourself and your organization's users about two increasingly popular social engineering schemes: email bombing and paste and run Red Canary Intelligence
Shape shifting: How to wrangle unpredictable data at scale The Red Canary Blog: Information Security Insights 2 weeks 2 days ago Red Canary’s engineering team transforms petabytes of data from third-party vendors into a consistent, readable format for threat detection Ian Woodley
Intelligence Insights: June 2025 The Red Canary Blog: Information Security Insights 2 weeks 6 days ago Amber Albatross abides and a new color bird threat, Mocha Manakin, manifests in this month's edition of Intelligence Insights The Red Canary Team
Mocha Manakin delivers custom NodeJS backdoor via paste and run The Red Canary Blog: Information Security Insights 2 weeks 6 days ago Named by Red Canary, Mocha Manakin uses paste and run with PowerShell to drop a custom NodeJS backdoor that could lead to ransomware Red Canary Intelligence
A large learning model: Red Canary’s AI journey The Red Canary Blog: Information Security Insights 4 weeks 1 day ago Red Canary was experimenting with generative AI B.C. (before ChatGPT). Our new next-gen AI agents are the capstone of a years-long journey. Rafael Del Rey
All about that baseline: Detecting anomalies with Surveyor The Red Canary Blog: Information Security Insights 1 month ago The Surveyor open source tool can help organizations establish a baseline of their environment, verify activity, and investigate anomalies. Tre Wilkins
Red Canary CFP tracker: June 2025 The Red Canary Blog: Information Security Insights 1 month ago Red Canary's monthly roundup of upcoming security conferences and calls for papers (CFP) submission deadlines Shelley Moore
Here’s what you missed on Office Hours: May 2025 The Red Canary Blog: Information Security Insights 1 month 1 week ago
Red Canary to join Zscaler The Red Canary Blog: Information Security Insights 1 month 1 week ago Today we are announcing a major milestone in our journey – Zscaler has signed a definitive agreement to acquire Red Canary. Brian Beyer
Intelligence Insights: May 2025 The Red Canary Blog: Information Security Insights 1 month 2 weeks ago Amber Albatross continues its reign and Latrodectus crawls into the top 10 in this month's edition of Intelligence Insights The Red Canary Team
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Cisco Duo Security The Red Canary Blog: Information Security Insights 1 month 2 weeks ago Everything you need to know about the differences between conditional access policies in Microsoft Entra ID and Cisco Duo. Sam Straka
Getting started with Conditional Access: Comparing Entra ID Conditional Access with Okta The Red Canary Blog: Information Security Insights 1 month 3 weeks ago Everything you need to know about the differences between conditional access policies in Microsoft Entra ID and Okta. Sam Straka
Getting started with Conditional Access: 5 must-have Entra ID policies The Red Canary Blog: Information Security Insights 2 months ago We walk through Conditional Access prerequisites and recommend the top five CA policies you should implement first. Sam Straka
Critical vulnerability in SAP NetWeaver enables malicious file uploads The Red Canary Blog: Information Security Insights 2 months 1 week ago Adversaries can exploit CVE-2025-31324 to upload web shells and other unauthorized files to execute on the SAP NetWeaver server The Red Canary Team
Intelligence Insights: April 2025 The Red Canary Blog: Information Security Insights 2 months 2 weeks ago Amber Albatross looms large and Arechclient2 makes its debut in this month's edition of Intelligence Insights The Red Canary Team