Get full endpoint visibility, detection, and response.
Empower your teams with science-backed security awareness training.
Protect your Microsoft 365 identities and email environments.
Managed threat response and robust compliance support at a predictable price.
Packed with the information, tools, and guidance you need to keep your organization running smoothly and, most importantly, your patients safe.
Key Methods had seen their share of security incidents. But when one of their clients suffered a mass-isolation event, they realized they were flying blind. Attackers had accessed sensitive data, but without clear logs, they were left scrambling.
Be the first to know about CVEs and threat advisories that we're seeing on the front lines. We'll break down how these threats or attacks work, do in-depth analysis, and provide mitigation guidance.
Rapid Response: Samsung MagicINFO 9 Server Flaw
Rapid Response: ASUS Live Update Attack (Operation ShadowHammer)
Deep Dive: Kaseya VSA Mining Payload
Troubleshooting Procmon & Sysmon v3.32
Deep Dive: Squashing an MSSQL Attack
CVE-2025-30406 - Critical Gladinet CentreStack & Triofox Vulnerability Exploited In The Wild
Validating the SolarWinds N-central “Dumpster Diver” Vulnerability
MSP Moment: Worming Malware Brings New Complexities to the Threat Landscape
CrushFTP CVE-2025-31161 Auth Bypass and Post-Exploitation
Oh No Cleo! Malichus Implant Malware Analysis
Threat Advisory: Oh No Cleo! Cleo Software Actively Being Exploited in the Wild
Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software
SlashAndGrab: The ConnectWise ScreenConnect Vulnerability Explained
SlashAndGrab: ScreenConnect Post-Exploitation in the Wild (CVE-2024-1709 & CVE-2024-1708)
Think Your ScreenConnect Server Is Hacked? Here’s What To Look For.