EDR / MDRIdentify, contain, respond, and stop malicious activity on endpoints
SIEMCentralize threat visibility and analysis, backed by cutting-edge threat intelligence
Risk Assessment & Dark Web MonitoringIdentify and quantify unknown cyber risks and vulnerabilities
Cloud App SecurityMonitor and manage security risk for SaaS apps
SOC ServicesProvide 24/7 threat monitoring and response backed by ConnectWise SOC experts
Policy ManagementCreate, deploy, and manage client security policies and profiles
Incident Response ServiceOn-tap cyber experts to address critical security incidents
Cybersecurity GlossaryGuide to the most common, important terms in the industry
Cyber Research Unit (CRU)
Threat Hunting and Threat Intelligence for TSPs and MSPs
Meet the team dedicated to decoding the mysteries of cybersecurity
All about the CRU
All the latest in security news. The CRU identifies new vulnerabilities, researches them, and shares what they find with all to see.
The CRU has developed automated tools to perform basic analysis on security incidents to help automatically make decisions on escalation and remediation.
With “research” in the name, it only makes sense that research is involved. They dig deep into automated and manual malware analysis, vulnerabilities, and more.
The CRU monitors ransom leak sites and malicious botnets for new threats, uses OSINT resources, and utilizes data from the Perch platform to help create content and complete research.
With the CRU, cyber threat hunting involves building visualizations to highlight abnormal activity, searching through data for new indicators of compromise (IoCs), or testing various queries and reviewing the results.
The CRU is a big fan of hosting CTFs, and for good reason. From their eyes, cybersecurity capture the flag events are a great way to dip your toes into cybersecurity or build upon expert skills.
Threat ReportView All >>
Microsoft Teams Local Information Disclosure in Windows, Linux, and macOS
Security researchers have disclosed that the Microsoft Teams desktop application stores access tokens in clear-text.
Patch Tuesday – September 2022
Today, September 13, is Patch Tuesday. Patch Tuesday is the second Tuesday of each month when Microsoft and other vendors, such as Adobe, release security updates to their products to patch discovered vulnerabilities. This month there was patches released for 64 new vulnerabilities with five rated with a severity of Critical, 57 Important, and two Moderate.
Chrome Extension Banking Trojan Targeting Mexico
ConnectWise Cyber Research Unit Threat Feeds
View the CRU threat feed >>
This repository contains lists of threat intelligence discovered by the CRU using our internal sandbox built on top of the Perch platform or found while threat hunting. This data is threat intelligence the CRU has been collecting for years and using internally at ConnectWise for threat hunting and threat analysis assistance. We use this intelligence daily, searching for these indicators in our customer's network data to find new threats and filter out false positives. This feed is updated daily.
Who we are
The ConnectWise CRU (Cyber Research Unit) is comprised of seasoned cyber professionals with deep engineering, IT administration, security operations, and incident analysis and response expertise. Leveraging years of real-world, hard knocks experience, the CRU team is dedicated to expanding the industry's collective understanding of today’s threat landscape. Armed with this intelligence, we seek to help defenders improve their defense-in-depth and keep critical assets safe.
2022 MSP Threat Report
Download the report >>
See what the CRU put together in the third edition of the MSP Threat Report. Get an eye-opening look at what MSPs faced in 2021 and predictions for 2022 and beyond.