RP Logo

The Latest Red Piranha News

After an eventful last month, here we are!

Thank you to all our partners for attending our October regional partner events in Melbourne, Sydney, and Perth, and the follow-up online partner event.

It is always a pleasure meeting our partners and engaging in conversations about cybersecurity and how our service/product offerings allow our partners to gain a significant competitive edge and enjoy peace of mind.

Exciting News: We have been named the winner of not one but two awards at Cyber Defense Magazine’s Top InfoSec Innovator Awards for 2024 during CyberDefenseCon 2024. Please scroll down to read about our latest win.

Red Piranha Named Winner of the Coveted Top InfoSec Innovator Awards for 2024

News3

Red Piranha has been awarded the titles of "Market Leader in Advanced Persistent Threat Detection and Response" and "Best Solution in SOC-as-a-Service" at Cyber Defense Magazine’s prestigious 12th Annual InfoSec Awards during CyberDefenseCon 2024!

This recognition marks a significant milestone in our journey to deliver cutting-edge, Australian-made, defence-ready cybersecurity solutions that enhance true sovereign capability.

Congratulations to all the winners, and a huge thank you to our exceptional team, who work tirelessly to protect businesses against ever-evolving threats.

Learn more about our latest win

Crystal Eye Essentials Module 1 and 2 Training Sessions

Following up on the success of our regional partner events, we are organising our Crystal Eye Essentials Module 1 and 2 training sessions for our partners. This is the perfect opportunity to get a 'hands-on' introduction to our Orchestrate, designed with your convenience and speed in mind. Don't miss out on this chance to get a close-up view and personal introduction to our latest operating system on the Crystal Eye XDR platform. And earn the Crystal Eye Essentials Certificate.

A big thank you to everyone who attended the Module 1 training session. We’ll be seeing you tomorrow for the Module 2 session!

Crystal Eye Essentials Module 2: Crystal Eye XDR Demo

News3

Register today

Crystal Eye XDR Update

Software Update: Hotfix
We will be releasing a hotfix for Automatic Updates in 5.0 Missing Some Packages https://forum.redpiranha.net/t/advisory-automatic-updates-in-5-0-missing-some-packages/520 on 16/11/2024.

This update addresses a limited number of cases where one of our key features is not completed in a timely fashion. Our automated software updates are an important part of what makes Crystal Eye unique by eliminating the requirement of the Systems Administrator to monitor providers for updates and manually apply them.

Red Piranha has taken the proven software management model used by the mobile device class of products that continually update applications with little or no interaction needed by the operator.

This ensures that any functional updates or security enhancements are applied within 24 hours of release automatically greatly reducing the risk of exposure to sites protected by Crystal Eye.

Red Piranha Announces the Launch of the Crystal Eye XDR Series 70

We’re excited to introduce the latest addition to our Crystal Eye XDR lineup – the powerful Series 70. Built for large enterprises and organisations with high-security demands. Like every other Crystal Eye appliance, the Series 70 represents the leading edge of our hardware platforms and growing software capabilities, combining advanced threat detection, response capabilities, and unmatched data handling power to protect critical infrastructures from evolving threats.

Key Highlights of the Crystal Eye XDR Series 70:

  • 2RU Rack Mount Chassis.
  • Powerful Dual Intel Xeon Processors boasting 32 cores.
  • 128GB DDR5 RAM.
  • Dual 1TB Redundant System Drives.
  • Up to 4 x 2.5-inch SSD hot swappable drives for extended log storage.
  • Redundant Hot Swappable Power Supply
  • Networking options of up to 6 of the following:
    • Dual QSFP 40GbE
    • Dual SFP28 25GbE
    • Quad SFP+ 10GbE
    • Quad RJ45 10GbE
    • Quad RJ45 1GbE
The Series 70 is designed to be the midpoint between the i9-powered Series 60 and the 64-core Series 80 for organisations needing full security processing and protection of up to 500 seats or 1000 devices.

We continue to provide updates to the Crystal Eye OS with 5.0 field upgrades ready for all appliances on Crystal Eye OS 4.5 as a part of the annual software license. We have been reaching out to Partners and End Users to advise of the availability of the update.

This update brings a number of new features and functionalities to Crystal Eye Appliances that broaden the protection offered by the Crystal Eye Platform and open up capabilities to address the evolving threat landscape.

To read more about the 5.0 update and features visit the forum or directly access the post in our Community Support (link here).

If you want to know more about upgrading your appliance to 5.0, contact support@redpiranha.net for your field upgrade guide.

Service Spotlight: Incident Response – Difference between Proactive and Reactive Threat Hunting in Incident Response

News3

Threat hunting is a cybersecurity practice of identifying threats that may evade traditional security measures. It's vital in Incident Response as it significantly enhances an organisation's ability to identify, contain, and mitigate security risks.

Incorporating threat hunting into the incident response cycle allows security teams to detect and respond to emerging threats more effectively. By acting as the "first line of detection," threat hunting supports IR in identifying threats that could otherwise go unnoticed and improving the organisation’s preparedness for future incidents.

In IR, proactive and reactive threat hunting approaches are two different ways of identifying, managing, and mitigating cyber threats.

Proactive Threat Hunting
Proactive threat hunting is a forward-looking approach focused on detecting threats before they spread and cause harm. It involves continuous analysis of systems and networks for potential threats, even when there are no signs of an active attack. It prioritizes unusual behaviours or patterns that deviate from the norm rather than relying solely on the Indicator of Compromise (IOC).

Proactive Threat Hunting involves hypothesis-based investigations, where threat hunters look for patterns of behaviour that indicate malicious intent. It employs intelligence-driven methods, such as threat intelligence feeds, to stay ahead of attackers, and relies heavily on behavioural analysis, statistical baselining, and anomaly detection.

It aims to identify known and unknown threats, APTs and hidden indicators of compromise (IOCs).

Reactive Threat Hunting
Reactive threat hunting is a response-based approach that focuses on investigating threats after suspicious activity has been detected. It often involves responding to alerts or other indicators of an ongoing or past incident. It's typically alert-driven, triggered by specific indicators like suspicious network traffic, anomalous behaviour, or detection by security tools.

Reactive threat hunting involves rapid response and investigation to assess the scope, impact, and root cause of a detected incident. It requires forensic analysis to understand and mitigate any damage caused by the attack.

It aims to contain and remediate an identified threat quickly, preventing further spread or damage within the organisation.

Both approaches are essential in a robust incident response strategy, as proactive hunting helps reduce potential threats, while reactive hunting ensures rapid response to ongoing attacks. Combining both improves an organisation’s security posture by covering potential and active threat vectors.

Red Piranha's Threat Detection, Investigation and Response (TDIR) offers a powerful defence framework with up to 10x increased threat visibility, empowering organisations to gain in-depth insights into network operations and identify Advanced Persistent Threats (APTs) and previously unseen attacks through sophisticated network behavioural analytics.

Known malware families and Command-and-Control (CnC) call-outs like Cobalt Strike are promptly detected, ensuring robust protection against evolving threats. With fully operationalised threat intelligence, Red Piranha enables organisations to efficiently deploy contextualised insights and receive automated, actionable intelligence, allowing them to protect, detect, and respond proactively. Human-machine teaming further enhances response capabilities by improving alert prioritisation and fostering effective collaboration.

Proactive threat hunting capabilities allow early detection of embedded APTs, minimising dwell time and potential damage. A multi-tenanted sensor deployment strengthens detection across East-West traffic, while integrated PCAP analysis uncovers deeper threats. Additionally, on-demand SOC services with digital forensics expedite incident response, and advanced heuristics with machine learning anomaly detection enhance alert confidence, enabling a precise and informed security posture.

Get in touch with us to know more

The Threat of Lateral Movement: Are you covered?

News3

Cybercriminals aren't just breaking in—they're moving laterally through your network, exploiting vulnerabilities, and escalating privileges to reach their target. Lateral movement is one of the most critical phases of modern cyberattacks, enabling adversaries to compromise entire systems from a single breach.

Learn how Lateral Movement Threats can put your entire network at risk and what you can do to stop attackers from spreading. Get practical tips to detect and prevent Lateral Movement in your systems.

Learn everything you need to know about Lateral movement

Rhysida Ransomware – Everything You Need to Know

News3

Rhysida ransomware is not a new name in the threat landscape, however, its recent attack on a major transportation hub in the US highlights the growing risk of ransomware attacks targeting critical infrastructures. Unlike traditional ransomware attacks, the group is known to use advanced techniques like LOTL and persistence.

Red Piranha’s Crystal Eye, a best-in-class Threat Detection, Investigation, and Response (TDIR) platform, uses a multi-layered defence strategy to effectively detect and prevent the tactics, techniques, and procedures (TTPs) used by such ransomware groups.

Read all about Rhysida Ransomware

Red Piranha Events

Here’s a roundup of the events we organised and attended recently:

Partner Event – Melbourne

News3

Partner Event – Sydney

News3

Partner Event - Perth

News3

AISA PerthSEC Conference

News3

CyberWest Hub's Students of Cyber

News3

WiTWA 2024 Tech [+] Awards

News3

Subscribe
Now

Request a
Demo

Leave a
Review

News3

News3

News3

Questions?

Get in touch. If you have any questions, comments or feedback regarding our ongoing programs, products or services, please submit them to support@redpiranha.net or head to our forum at https://forum.redpiranha.net/.

**Terms and conditions apply!
Contact your business development manager to receive a copy of the terms and conditions. Prices are correct as of 13/01/2021, subject to change.

share Facebook LinkedIn Twitter YouTube

Copyright 2024 – Red Piranha - All Rights Reserved