Research Articles, Videos and Webcasts

Packet Capture Intelligence With DynamiteLab

Telling a Story of Network Behavior from a PCAP File

Does the world need another way to analyze network traces? We won’t convince everybody, but we think so. We built DynamiteLab on a fresh approach for traffic analysis that empowers users of all knowledge levels to study and extract intelligence from network packet-captures.

Read More

Career Advice for Cybersecurity

Tips for Professional Success

It is not a secret that cybersecurity can be a very rewarding career path. Demand for cybersecurity professionals is at all-time high, providing many job opportunities and excellent compensation. However, this is a complicated field that requires proficiency in diverse technologies and industry subjects. Today, I am sharing my thoughts on a few building blocks that may lead to a successful cybersecurity career.

Read More

Agile Decision Making in Cybersecurity

The Case for Cyber Threat Intelligence and Threat Hunting

In today’s world of increasingly complex cyberwarfare, Security Operations Centers (SOCs) have to contend with an overload of cybersecurity indicators and their supporting information. Incident responders must make critical decisions with limited evidence and little time. Cyber Threat Intelligence and Threat Hunting are designed to augment the SOC process constraints with advanced levels of situational awareness and decision support.

Read More

Cyberwarfare in the Russian Assault Against Ukraine

The Role of Cyber Attacks in a Conventional War

On January 14th of 2022, the Security Service of Ukraine (SSU) stated that the country was the target of an ongoing “wave of hybrid warfare,” aiming to instill anxiety and undermine Ukrainian society’s confidence in the state’s ability to defend its citizens. The active cyber offensive by Russia against Ukraine began weeks before the Russian invasion on February 24.

Read More

Zero Trust Architecture and Network Visibility

Comprehensive Network Visibility & Analytics Are Now a Requirement

At Dynamite Analytics, we've witnessed the shift from Perimeter Security to Zero Trust Architecture in network security best practices. Our work in network visibility and traffic analysis has become vital for enforcing Zero Trust principles. As the industry moves from on-premise networks to hybrid and cloud environments, we see Zero Trust integrated into strategic corporate objectives. Our network sensor, Dynamite Agent, uses leading network traffic inspection technologies, Zeek and Suricata, to offer seamless integration with existing SIEM/SOAR cyber monitoring solutions. Experience the benefits of Dynamite Agent with a 15-day trial and free consultation from Dynamite Analytics on AWS Marketplace.

Read More

Race Against Time in Ransomware Cyber Attacks

Why Attacker Dwell-Time Is so Critical in Averting a DARKSIDE Disaster

In the age of ransomware, attacker dwell time has become a critical factor in averting disasters like the DARKSIDE attack on the Colonial Pipeline. With ransomware-as-a-service (RaaS) on the rise, organizations must be prepared for post-exploitation and adopt strategies like the zero-trust model and comprehensive ransomware detection to mitigate risks. Dynamite Agent, by Dynamite Analytics, enables network detection and response (NDR) capabilities in AWS environments, providing essential network visibility for investigating complex ransomware attacks.

Read More

The Pyramid of Pain in the SolarWinds Cyber Attack

An Educational Resource Article

The SolarWinds supply chain attack was one of the most sophisticated cyber-attacks in history. It combined many unique adversarial techniques hidden under a trusted software update, successfully bypassing almost all information security controls. Every cybersecurity organization now faces a question – what to do next. To better understand the complexity and impact of the SolarWinds incident, we have to consider the adversary’s motivation behind this attack.

Read More

What is Network Metadata?

The Ways to Describe Network Traffic Behavior

Network metadata is descriptive information about the data, specifically pertaining to the structure of network protocols and packets. It represents telemetry of network connections and the artifacts associated with these connections. Network metadata is used for cyber analytics, and it is acquired through technologies such as Deep Packet Inspection (DPI), flow data, and network packet capture files (PCAPs).

Read More

We use cookies to ensure proper website functionality and user experience. For more information, see our Privacy Policy.

Close Popup
Privacy Settings saved!
Privacy Settings

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. Control your personal Cookie Services here.

These cookies are necessary for the website to function and cannot be switched off in our systems. The website cannot function properly without these cookies.


Decline all Services
Accept all Services