• Back

Blog

Author

QOMPLX Staff

Tysons, Virginia

Profile image for author

Profile image for author

Written by QOMPLX Staff

Written by QOMPLX Staff | April 30, 2021

We take a look at how QOMPLX’s technology helps customers to spot the use of encoded commands in conjunction with the PowerShell utility.

Written by QOMPLX Staff | April 30, 2021

In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot attackers efforts to hide their use of PowerShell by running it in the background of another application.

Written by QOMPLX Staff | April 28, 2021

In this post, we’re taking a look at how QOMPLX’s technology helps customers to spot one technique for foot-printing target environments: DNS zone transfers.

Written by QOMPLX Staff | April 27, 2021

QOMPLX’s Identity Assurance software validates that each user who requests access is who they say they are using patented stateful validation of the SAML protocol and other deterministic detections.

Written by QOMPLX Staff | April 27, 2021

Identity Assurance validates that each user who requests access is who they say they are using patented stateful validation of the SAML protocol and other deterministic detections.

Written by QOMPLX Staff | April 27, 2021

We take a look at how QOMPLX’s technology helps customers to spot malicious account enumeration activity, which often is an early indication that an attack is taking place.

Written by QOMPLX Staff | April 22, 2021

For defenders, monitoring sensitive user groups for changes is an effective way to detect suspicious activity or malicious activity and disrupt efforts by threat actors to achieve persistent access to your environment.

Written by QOMPLX Staff | April 20, 2021

Tuesday | April 20, 2021 1:00 P.M. ET