Robuta

https://redcanary.com/threat-detection-report/techniques/rename-system-utilities/ Rename System Utilities - Red Canary Threat Detection Report Mar 17, 2025 - Adversaries rename system utilities to circumvent security controls and bypass detection logic dependent on process names and process paths. canary threat detectionrename https://redcanary.com/threat-detection-report/ Welcome to the Red Canary Threat Detection Report Dec 4, 2025 - Our Threat Detection Report takes a close look at the top techniques, threats, and trends to help security teams focus on what matters most. canary threat detectionred https://redcanary.com/threat-detection-report/threats/rose-flamingo/ Rose Flamingo - Red Canary Threat Detection Report Mar 14, 2025 - Rose Flamingo relies on search engine optimization (SEO) poisoning to trick victims into infecting themselves. canary threat detectionrose https://redcanary.com/threat-detection-report/trends/affiliates/ Malware Affiliates - Red Canary Threat Detection Report Mar 18, 2025 - The threat landscape continues to move toward a software-as-a-service (SaaS) economy with malware affiliates at the helm. canary threat detectionred https://redcanary.com/threat-detection-report/techniques/impair-defenses/ Impair Defenses - Threat Detection Report - Red Canary Jun 3, 2025 - Adversaries Impair Defenses to evade preventive, detective, or mitigatory controls that would otherwise hinder their success threat detection reportimpair