Skip to main content

InQuest Blog

Posted on 2020-11-24 by Isabelle Quinn
To validate an e-mail security stack's capability in blocking current real-world threats harvested from the wild, InQuest gathers unique malware daily and validates the common cloud e-mail providers (GSuite, O365). Collectively (stacked on top of one another), the providers' default security stacks are capable of detecting between 85% and 95% of these novel attacks. The samples capable of bypassing these stacks are candidates for the InQuest Email Security Assessment.
Posted on 2020-11-23 by Chris Crowley and Josiah Smith
The SOC-Class is a niche course on cybersecurity operations, training CISOs, SOC Managers, and technical leads to build and excel in Cybersecurity Operations Centers SOCs/CSOCs. This use case development methodology is one of the approaches discussed in the course and is intended to provide a framework for mature and repeatable construction of engineered detections.
Posted on 2020-10-26 by Josiah Smith
Cybersecurity Awareness Month was launched in 2004 as a broad effort to help all Americans stay safer and more secure online. Over the years, the program's themes have changed with technology and matured into a widespread initiative. This blog admires the effort of the security industry and governmental organization inspiring to create change and keep cyberspace safe. Read through a bit of history, steps to create a program, and a maturity model framework.
Posted on 2020-10-13 by Erik Pistelli
Reverse engineering malicious documents with Cerbero Suite. The Hacker's Multitool provides functionality to aid in a multitude of analysis needs. With support for Office Documents, PDFs, images, Email, RTF, and SDK is just the beginning. There is also the flexibility to analyze Windows memory and crash dumps or to integrate with Ghidra. For in-depth malware analysis, make sure to subscribe to their YouTube channel.
Posted on 2020-09-29 by Chris Morrow
InQuest Labs is one year old! Let's take a look at how the site has grown over the last year, the new API documentation, and what's in store for the future of Labs!

Blog Archive