https://redcanary.com/threat-detection-report/techniques/rename-system-utilities/
Rename System Utilities - Red Canary Threat Detection Report
Mar 17, 2025 - Adversaries rename system utilities to circumvent security controls and bypass detection logic dependent on process names and process paths.
canary threat detectionrename
https://redcanary.com/threat-detection-report/
Welcome to the Red Canary Threat Detection Report
Dec 4, 2025 - Our Threat Detection Report takes a close look at the top techniques, threats, and trends to help security teams focus on what matters most.
canary threat detectionred
https://redcanary.com/threat-detection-report/threats/rose-flamingo/
Rose Flamingo - Red Canary Threat Detection Report
Mar 14, 2025 - Rose Flamingo relies on search engine optimization (SEO) poisoning to trick victims into infecting themselves.
canary threat detectionrose
https://redcanary.com/threat-detection-report/trends/affiliates/
Malware Affiliates - Red Canary Threat Detection Report
Mar 18, 2025 - The threat landscape continues to move toward a software-as-a-service (SaaS) economy with malware affiliates at the helm.
canary threat detectionred
https://redcanary.com/threat-detection-report/techniques/impair-defenses/
Impair Defenses - Threat Detection Report - Red Canary
Jun 3, 2025 - Adversaries Impair Defenses to evade preventive, detective, or mitigatory controls that would otherwise hinder their success
threat detection reportimpair