Speed Matters: The Crucial Role of MTTD and MTTR in Cybersecurity

Cybersecurity is a fast-paced world, and when we talk about it, two important measurements often come up: how quickly we can spot a problem (Mean Time to Detect or MTTD) and how fast we can fix it (Mean Time to Respond or MTTR). These metrics are pivotal in evaluating the effectiveness of security operations within […]
Automating Forensic Analysis for Linux Endpoints

TL;DR We just released a new version of our popular endpoint scanner for Linux machines, so the Autonomous SOC platform can immediately get you even more of the evidence and comprehensive analysis you need. The automated endpoint scanner for memory forensics is a powerful tool in Intezer and now it’s available for investigating and triaging […]
Threat Escalation: Focusing On What Matters Most

TL;DR Make sure your team immediately gets Intezer’s investigation findings about confirmed, critical threats, by sending automatic notifications via email or tickets in any webhook-supported system your team uses like ServiceNow. At Intezer, we’re always looking for ways to make your security operations more efficient and function like a real extension of your team. One […]
How MSSPs Use Smart Automation for Fast Incident Response

Learn more here about Intezer for MSSPs. Managed Security Service Providers (MSSPs) are crucial in helping organizations protect their critical assets, maintain a strong security posture, and quickly respond to cyber attacks. To keep up with the ever-changing threat landscape, top MSSPs are increasingly leveraging advanced incident response automation like our Autonomous SOC platform to […]
ServiceNow Security Operations: Streamlining Incident Response Workflows with Intezer

For SOC teams using ServiceNow Security Operations, integrating your key security tools like Intezer ensures you can optimize your incident response process and reduce time to respond. Intezer’s security operations integration with ServiceNow is like having a virtual team of the best security experts, working tirelessly to respond to your alerts and streamline your incident […]
Supercharge These 3 Top Incident Response SOAR Playbooks

Quick and accurate responses to threats are essential for cybersecurity teams. SOAR playbooks provide structured workflows to handle common security incidents. However, as automating with SOAR has its limitations, there’s a clear need to enhance these playbooks with powerful third-party tools. Intezer’s AI-powered solution integrates with SOAR tools to supercharge your incident response playbooks. By […]
Detect Phishing Emails by Inspecting Email Headers, Attachments, and URLs

Emails were created as a method to pass messages between users, and now they are used by individuals and organizations all around the globe, by both big and small companies across all industries. But emails also have a dark side – phishing emails that are used by threat actors to gain access to victims’ systems. […]
How to Analyze Malicious PDF Files

PDF files are supported in Intezer for both on-demand sandboxing and automated alert triage, as well as all other file types commonly used for delivering malware, like binary files or Microsoft Office formats. Portable Document Format (PDF) files are a cross-platform file format that supports links, images, and fonts. The flexibility of the PDF format makes […]
Automating QR Code Phishing Email Investigations 🔍

At Intezer, our commitment to enhancing security operations efficiency and effectiveness remains unwavering. Today, we’re excited to unveil yet another important feature: QR Code Analysis within our Automated Phishing Investigation pipeline. This addition is specifically tailored to address the evolving landscape of phishing threats, where QR codes are increasingly being weaponized by adversaries. The Challenge […]
How to Analyze Malicious Microsoft Office Files

Microsoft Office files (and other file types commonly used for delivering malware, including binary files, documents, scripts, and archives) are supported in Intezer for both on-demand sandboxing and automated alert triage. Phishing attacks are one of the three primary ways attackers get access to organizations according to Verizon’s 2023 Data Breach Investigations Report… and many […]