Quishing Triage 101: How to Investigate Suspicious QR Codes in Emails

Check out our newest blog to learn about how Intezer automatically triages suspicious emails and investigates QR code-based phishing emails. No coding required. For a free way to set up QR code triage for phishing emails (using Pipedream and some Python) and to learn more about “quishing”, keep reading this post below. Quishing, derived from […]

Elevating Phishing Investigations With Generative AI

We’re excited to announce a significant enhancement to our Automated Phishing Investigation solution, using Generative AI. Intezer can now inspect the actual text of emails by integrating with Generative AI, adding another layer of analysis to our robust phishing investigation suite. With Generative AI, Intezer can now analyze the body content and HTML for hidden […]

Streamlining Security Operations with Intezer and Cortex XSOAR

Organizations are always on the lookout for ways to enhance and automate their security operations. The collaboration between Intezer and Cortex XSOAR presents a formidable combination, empowering security experts to automate the alert triage and response to threats. In this article, we will explore the improved version of Intezer and Cortex XSOAR integration, emphasizing its […]

How Hackers Use Binary Padding to Outsmart Sandboxes and Infiltrate Your Systems

What is binary padding? How can you detect against threats using junk data in various ways to evade defensive systems and sandboxes? Read on to learn more. Binary padding is the process of adding extra or junk data to a portable executable (PE) file that, while not changing the behavior of the binary, changes certain […]

Reducing Alert Fatigue in Your Security Operations Center with AI

The Security Operations Center (SOC) is a high-pressure environment where analysts work (sometimes in around-the-clock shifts) to protect organizations from cybersecurity threats. Maintaining high morale in such a demanding setting is essential for the well-being and productivity of the team, especially if you still have analysts manually doing alert triage and facing alert fatigue. Integrating […]

Embracing AI Analysts to Strengthen In-House SecOps Teams

With artificial intelligence technology rapidly advancing, it’s now possible to automate even more of the repetitive, manual, and even skilled tasks that consume the time of overloaded security operations analysts. Especially the “grunt work” that leads to alert fatigue. Organizations often face the dilemma of outsourcing their security operations centers (SOCs) or investing in in-house […]

5 Ways to Use ChatGPT in Your SOC: Real-World AI Applications to Streamline Alert Triage

Check out our other blogs here to learn how Intezer uses Generative AI to analyze and summarize text-based threats like scripts and macros or interpret text and hidden elements in phishing emails. Security Operations Center (SOC) teams face the daunting challenge of staying one step ahead as cyber threats continue to evolve. With an ever-increasing […]

Infected: Understanding a Malicious Result from an Endpoint Scan

Endpoints are a key target in cyberattacks, so it’s critical to ensure that you’re able to effectively triage and investigate alerts from your endpoint detection systems. Including threats that hide in memory, like fileless malware or scheduled tasks created by an attacker. Intezer’s Endpoint Scanner is a powerful forensics tool for detecting advanced in-memory threats […]

Are Challenges Faced by SecOps Teams in 2023 an Opportunity?

If there weren’t enough challenges for security operations (SecOps) teams already, economic uncertainty and hits to revenue are forcing organizations to rethink their cybersecurity needs. SecOps teams will be as impacted as the other departments. For years now, the security industry has suffered from a shortage of skilled professionals, alert fatigue, and the growing complexity […]

Adopting AI-Powered Automation for Tierless SOC Teams

“Artificial intelligence” and “automation” have been buzzwords in the world of cybersecurity for a while now, however, enterprises are still struggling to fully realize its potential for incident response. In today’s complex and rapidly changing threat environment, manual security processes for security operations (SecOps) are not enough to keep up with the pace of threats. […]