/
EDR detections

EDR detections

An unsafe file is one that has attributes that greatly resemble malware.

Source table → edr.cylance.threats

Falcon Overwatch has identified suspicious activity. This has been raised for your awareness and should be investigated as normal.

Source table → edr.crowdstrike.falcon

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.

Source table → edr.all.threats

Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks.

Source table → edr.all.threats

The REvil Ransomware has hit 40 service providers globally due to multiple Kaseya VSA Zero-days. the attack was pushed out via a infected IT Management update from Kaseya.

Source table → edr.all.threats