Blog

Filter: Results for "antivirus" - Clear Filter

VALHALLA YARA and Sigma Rule Feed

Boost your detection capabilities with the power of thousands of hand-crafted high-quality YARA and Sigma rules.VALHALLA supercharges your detection with + YARA and + Sigma rules - hand crafted, curated and high quality. The database grows...

read more

ASGARD Management Center

Configure, schedule and control scans on up to 25,000 end points per instance. ASGARD Management Center also features an IOC management as well as many response functions.ASGARD Management Center is the perfect incident response platform. It not only lets you execute...

read more
Tales Of Valhalla – March 2024

Tales Of Valhalla – March 2024

Every month the Nextron Threat Research Team (NTRT) shares insights into evasive threats that we’ve seen in the wild via our Valhalla service. The aim is to highlight interesting samples our rules detected and have or had very low detection rates as reported by...

read more

Compromise Assessment

Revolutionizing Threat DetectionDetect what others miss with Nextron’s advanced forensic tools and compromise assessments, empowering you to uncover hidden threats.Strengthen Your Cybersecurity With Actionable Insights. Traditional security tools like Antivirus...

read more
Cyber Security 2024: Key Trends Beyond the Hype

Cyber Security 2024: Key Trends Beyond the Hype

In this blog post, our threat research team presents the most critical cyber security trends for 2024. While many in the field are focusing on headline-grabbing topics like AI, our emphasis is on practical, impactful issues already shaping the cyber landscape. We...

read more

THOR APT Scanner

THOR detects hacking traces others overlook.It closes forensic blind spots with YARA, Sigma, and custom IOCs.THOR is the most sophisticated and flexible compromise assessment tool on the market. Incident response engagements often begin with a group of compromised...

read more
How to scan ESXi systems using THOR

How to scan ESXi systems using THOR

More and more often, adversaries target and exploit Internet-facing appliances or devices with exotic or restricted operating systems. Users ask if there is a way to run a compromise assessment scan on these systems with the YARA rules used in THOR. Following up on...

read more