Argus Usecases
- Blocking a known malicious actor
- Vulnerability Detection
- File Integrity Monitoring (FIM)
- Network IDS integration
- How Argus detects and responds to Mint Stealer
- Daolpu infostealer detection and response
- Monitoring Windows Resources with Performance Counters Using Argus
- Snapekit detection with Argus
- Detecting CUPS remote code execution vulnerability with Argus
- Streamlining Container Image Security with Grype and Argus
- Hunting for Linux Credential Access Attacks with Argus
- Detecting and Responding to CHAVECLOAK Malware
- Detecting PureHVNC malware with Argus
- Threat hunting using inventory data collected by Argus
- Detecting and responding to Latrodectus malware
- Detecting and removing malware using VirusTotal integration
- Ransomware protection on Windows with Argus
- Detect and respond to BlackSuit ransomware with Argus
- CJIS Security Policy
- Detecting Hidden Processes
- Detecting Suspicious Binaries with Argus
- Monitoring AWS Infrastructure with Argus
- Detecting a Brute-Force Attack with Argus
- DETECTING POWERSHELL EXPLOITATION TECHNIQUES IN WINDOWS USING ARGUS
- Detecting an SQL injection attack
- Monitoring Execution of Malicious Commands
- Detecting Unauthorized Processes