-
MDRAddress the growing frequency, type, and severity of cyber threats against SMB endpoints
-
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
-
Risk Assessment & Vulnerability ManagementIdentify unknown cyber risks and routinely scan for vulnerabilities
-
Identity ManagementSecure and streamline client access to devices and applications with strong authentication and SSO
-
Cloud App SecurityMonitor and manage SaaS security risks for the entire Microsoft 365 environment.
-
SASEZero trust secure access for users, locations, and devices
-
Enterprise-grade SOCProvide 24/7 threat monitoring and response backed by proprietary threat research and intelligence and certified cyber experts
-
Policy ManagementCreate, deploy, and manage client security policies and profiles
-
Incident Response ServiceOn-tap cyber experts to address critical security incidents
-
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Cyber Research Unit (CRU)
Threat Hunting and Threat Intelligence for TSPs and MSPs
Meet the team dedicated to decoding the mysteries of cybersecurity
Who we are
The ConnectWise CRU (Cyber Research Unit) is comprised of seasoned cyber professionals with deep engineering, IT administration, security operations, and incident analysis and response expertise. Leveraging years of real-world, hard knocks experience, the CRU team is dedicated to expanding the industry's collective understanding of today’s threat landscape. Armed with this intelligence, we seek to help defenders improve their defense-in-depth and keep critical assets safe.
All about the CRU
Security Content
All the latest in security news. The CRU identifies new vulnerabilities, researches them, and shares what they find with all to see.
Automation
The CRU has developed automated tools to perform basic analysis on security incidents to help automatically make decisions on escalation and remediation.
Research
With “research” in the name, it only makes sense that research is involved. They dig deep into automated and manual malware analysis, vulnerabilities, and more.
Intelligence
The CRU monitors ransom leak sites and malicious botnets for new threats, uses OSINT resources, and utilizes data from the Perch platform to help create content and complete research.
Threat Hunting
With the CRU, cyber threat hunting involves building visualizations to highlight abnormal activity, searching through data for new indicators of compromise (IoCs), or testing various queries and reviewing the results.
CTFs
The CRU is a big fan of hosting CTFs, and for good reason. From their eyes, cybersecurity capture the flag events are a great way to dip your toes into cybersecurity or build upon expert skills.
Threat Report
View All >>Threat Report
New Exchange Exploits Exploited in the Wild
News came out this week regarding a new method of exploiting Exchange that will bypass Microsoft’s recommended mitigations for ProxyNotShell.
Cybersecurity
ConnectWise Cyber Research Unit Threat Feeds
This repository contains lists of threat intelligence discovered by the CRU.
2023 MSP Threat Report
See what the CRU put together in the fourth edition of the MSP Threat Report. Get an eye-opening look at what MSPs faced in 2022 and predictions for 2023 and beyond.