Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Uptycs Adds Advanced Detection Capabilities in XDR Solution To Bolster Protection for Remote Workforces

Uptycs announced it has added capabilities to their XDR solution to provide improved detection and triage of advanced attacks and APT threat actors. Now, security teams have access to comprehensive tooling to detect, remediate, and protect against advanced external attacks.

“Working from home has created unforeseen challenges for security teams worldwide,” said Ganesh Pai, CEO, Uptycs. “The push to support remote workforces has accelerated cloud migration, and therefore expanded companies’ attack surfaces. These new capabilities reflect our ongoing commitment to stay ahead of potential threats so enterprises can run their businesses in the cloud with confidence.”

Recommended AI News: Red Hat Helps Türk Telekom Digitally Transform Across its Business to the Edge

Related Posts
1 of 40,572

Uptycs’ new capabilities its XDR solution include:

    1. Contextual detections. This feature provides analysts more context to understand the severity of a detection, specifically in-depth details around the toolkits used by threat actors. The Uptycs endpoint agent uses a highly optimized approach to scan the process memory using the YARA rules and then populates the profile of each detected malware/tool to provide details about the malicious software capabilities. The Uptycs threat research team continuously updates the YARA rules, and toolkit and threat profiles. Customers can also add their own custom YARA rules, toolkits descriptions, and threat profiles to track and hunt APT threat actors that may be targeting their organization.
    2. Automated threatbooks: The Uptycs threat research team provides threat intelligence to the product on a daily basis. Some portion of this intelligence is associated with high-profile attacks. The Uptycs platform automatically creates associated threatbooks and scans historical data to identify any previous infections.
    3. Lateral movement correlation enhancements: When an analyst is evaluating a detection, one crucial thing they need to know is whether a threat actor has moved laterally within the environment. Lateral movement detection feature of our correlation engine tries to detect the attack progression based on the proximity of other systems to the system that is under attack. We have added enhancements to identify close-proximity systems based on login attempts.
    4. Ransomware detection: Uptycs XDR agent now provides generic detection and protection against ransomware attacks on Windows operating systems. The capability is directly built inside the endpoint agent so it can protect against the attacks in offline mode as well. Additionally, Uptycs XDR provides Linux-targeted ransomware attacks detection via the Uptycs cloud
    5. Process code injection / DLL injection: The Uptycs XDR agent now provides generic detection to process code injection on both Windows and Linux endpoints. Process code injection is a technique used by attackers to inject malicious code inside a trusted running process to evade detection.
    6. Process hollowing: A sub-technique of process injection is process hollowing, where malicious actors attempt to evade defenses by injecting malicious code into suspended and hollowed processes. The Uptycs XDR agent now provides generic detection for process hollowing on both Windows and Linux endpoints.
    7. Master boot record (MBR) overwrite: The Uptycs XDR agent now provides generic detection of MBR overwrite on Windows-based endpoints. MBR overwrite is a technique used by adversaries where the goal is to disrupt operations and make the system unusable.
    8. Lsass.exe memory credential dumping: To detect attacker attempts to steal credentials, Uptycs XDR agent now provides generic detection of lsass.exe (Local Security Authority Subsystem Service) memory credential dumping on Windows-based endpoints.

Recommended AI News: LiveRamp Embedded Identity is Now Available in the Snowflake Media Data Cloud

[To share your insights with us, please write to sghosh@martechseries.com]

Comments are closed.