IronNet Cybersecurity Blogs

Stay up to date with IronNet’s executive commentary, threat research, and strategic analysis from the company’s blog at https://www.ironnet.com/blog.

​​​​​​​A new weapon against Command & Control infrastructures

Command and control (C2) infrastructures are the “brain” behind successful, malicious cyber-attacks, including malware, ransomware, ransomware-as-a-service, living-off-the-land attacks, etc. As dangerous cyber weapons, C2 infrastructures are used by cyber criminals to communicate nefarious commands to systems inside a compromised network. Learn more…

​​​​​​​​​​​​​​IronNet’s September Threat Intelligence Brief 2022

This ability to analyze and correlate seemingly unrelated instances is critical for identifying sophisticated attackers who leverage varying infrastructures to hide their activity from existing cyber defenses. As reported in the September Threat Intelligence Brief, our analysts review alerts from millions of data flows that are ingested and processed with big data analytics. Learn more…

​​​​​​​​​​​​​​Keeping your distance to keep secure

As we learned from the pandemic, it’s important to keep your distance from others when sick. When it comes to the security of your organization’s networks and assets, it’s similarly important to keep personal accounts and devices at a distance from corporate systems for network health. Learn more…

Still driving down the cyber highway crowded with white sedans?

There’s no secret that I have an affinity for cars. Some may say that I need an intervention. If you were to ask me what my favorite car is, I would be hard pressed to nail down an answer. But what I do know is this: my blue Porsche 911 is a thing of beauty. Not to mention doing 0 to 60 mph in 4 seconds. Learn more…