• > sign in
  • > Support
  • English
    • Español (Spanish)
Redborder | NDR Cybersecurity Solution
  • PLATFORM
    • Security
    • Network Detection & Response (NDR)
    • Performance
    • Network Performance Monitoring (NPM)
  • About us
  • Contact
  • Partner
  • Blog
  • RedBorder LIVE
  • Become a partner
  • PLATFORM
    • Security
    • Network Detection & Response (NDR)
    • Performance
    • Network Performance Monitoring (NPM)
  • About us
  • Contact
  • Partner
  • Blog
  • RedBorder LIVE
  • Become a partner
  • Home
  • Credential Extraction: What’s Really Going on Inside your Network
  • Uncategorized

Uncategorized

30JanJanuary 30, 2026

Credential Extraction: What’s Really Going on Inside your Network

Ben Wootton2026-02-04T09:44:20+00:00

Cyberattacks don’t start with“!!! PAY 10 BITCOIN TO WALLET X !!!”. There’s no warnings, just a bunch of credentials slipping out of memory and into the hands of someone who very m...

UncategorizedRead more...
09JanJanuary 9, 2026

Redborder or Darktrace? Deciding on 2026’s NDR Solution

Ben Wootton2026-01-09T11:53:23+00:00

If you work in cybersecurity, you probably don’t need a reminder that 2025 was a wild one. More alerts. More tools. More “AI-powered” promises. Yet, when something genuinely ser...

UncategorizedRead more...
16DecDecember 16, 2025

Incident Response Practices with Redborder NDR

Ben Wootton2025-12-16T16:28:48+00:00

Cyber threats are no longer occasional disruptions, they’re relentless and increasingly invisible. When an attack happens, how quickly can your team detect it and respond? Redbo...

UncategorizedRead more...
01DecDecember 1, 2025

Inside Parliment: Cyber Security Insights from Portcullis House

Ben Wootton2025-12-01T11:33:04+00:00

Last week, I had the privilege of attending a cybersecurity conference at Portcullis House in Westminster, London. From the moment I walked in, the venue set a serious tone. I went...

UncategorizedRead more...
12NovNovember 12, 2025

NDR vs EDR vs XDR | Understanding the Differences in Cybersecurity

Ben Wootton2025-11-12T10:56:47+00:00

Cybersecurity terminology is quite often very confusing. Organizations are told they need EDR, they need NDR, oh and they need XDR, but what does each one actually do, and how do t...

UncategorizedRead more...
27OctOctober 27, 2025

Knowledge Automation Security

redborder team2025-10-27T12:37:48+00:00

Cybersecurity is evolving. At the core of this evolution is Knowledge Automation Security (KAS), a new era of technology that changes how we detect and respond to network threats. ...

UncategorizedRead more...
08OctOctober 8, 2025

Phishing 101: Don’t Get Hooked, Be the Predator

Ben Wootton2025-10-08T09:59:11+00:00

Phishing is one of the oldest tricks in the book, yet one of the most dangerous. Despite years of awareness campaigns and email filters, phishing attacks continue to devastate orga...

UncategorizedRead more...
25SepSeptember 25, 2025

NDR Explained: How AI Detects Anomalies in Your Network

Ben Wootton2025-09-25T08:38:01+00:00

AI and Machine Learning (ML) are transforming how businesses detect network threats. Network Detection and Response (NDR) leverages these technologies to spot unusual activity acro...

UncategorizedRead more...
16SepSeptember 16, 2025

Catching a RAT: How Redborder Detected and Contained NanoCore

Ben Wootton2025-09-16T13:54:41+00:00

Our network detection and response (NDR) identified and responded to suspicious NanoCore RAT activity. Through continuous traffic inspection, real-time threat modeling and automate...

UncategorizedRead more...
26AugAugust 26, 2025

Checkmate Hackers: The NDR That Thinks Like a Chess Grandmaster

Ben Wootton2025-08-26T10:43:58+00:00

How Our NDR Works Like a Chess Engine — Outsmarting the Best CISOs in the World When you think about the greatest chess engines, like Stockfish or AlphaZero, what sets them apar...

UncategorizedRead more...
12…4Next  

Search

Support Center

Redborder Support Center is where you will find general information, FAQ and other documents that provide important information for customers and the community.

redborder

Redborder NDR is a Cybersecurity platform: active and scalable. We unify in one place some of the most powerful Cybersecurity tools such as, Next Generation IPS, Network Traffic Analysis, Security Information & Event Management (SIEM), Hardware Monitoring, Wireless Traffic Analysis (Cyber physics), big data and Correlation AI based engineand much more.

Recent Posts

Credential Extraction: What’s Really Going on Inside your Network
January 30, 2026
Redborder or Darktrace? Deciding on 2026’s NDR Solution
January 9, 2026
Incident Response Practices with Redborder NDR
December 16, 2025
Inside Parliment: Cyber Security Insights from Portcullis House
December 1, 2025
NDR vs EDR vs XDR | Understanding the Differences in Cybersecurity
November 12, 2025
Knowledge Automation Security
October 27, 2025
Get In Touch

Contact Us

Eneo Tecnología S.L
Innovalia Group
  • Address: Parque Tecnológico de Bizkaia
    Edificio 500 – Planta 1. 48160 Derio (Bizkaia)
  • Phone: +1 (980) 217 4766
  • Email:
  • Working Days/Hours: Mon - Sun / 9:00 AM - 8:00 PM

Follow Us

Twitter Linkedin
ens
> What we do
> About us
> Support
> Products
> Contact
> Redborder Live

Newsletter

Keep up on our always evolving product features and technology. Enter your e-mail and subscribe to our newsletter.

You have Successfully Subscribed!

Redborder | NDR Cybersecurity Solution © Copyright 2025. All Rights Reserved | Privacy Policy | Cookie Policy
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}