Videos & Webinars
-
53 minutes
Recorded 2024/10
WebinarEnterprise Breach Detection
Sam and Tyron discuss 'Detect Attackers on Your System Before They Dig In'.
-
19 minutes
Recorded 2017
WebinarHow Canary Works
If you want to take a blitz tour, check out this quick, recorded webinar.
-
2 minutes
Recorded 2015
VideoSetup & Usage
A demonstration showing just how easy it is to setup a Canary. The Canary is live in under 3 minutes!
-
66 minutes
Recorded 2019
TalkThe Canary Tool, Thinkst - Paul's Security Weekly #601
Haroon chats with the folks at Paul's Security Weekly about why hackers should create companies, and some of the technical details behind Canary!
-
42 minutes
Recorded 2019
KeynoteVirus Bulletin Keynote address: The security products we deserve
This talk aims to examine several of the dark-patterns that have become perfectly acceptable in infosec and then aims to drill down to their root causes.
-
20 minutes
Recorded 2022
VideoWhy Canary?
Haroon discusses why the world's best security teams run Thinkst Canary and why you should too.
Documents
-
Birding Guide
These are some of the most effective use cases for Canaries and Canarytokens.
Open PDFCanary Overview
An overview of Canaries and a handful of answers to commonly asked questions.
Canary Communications and Cryptography White Paper
An explanation of the communication and encryption used within the Canary protocol.
Blog
-
June 21, 2024
ShareFinder-How Threat Actors Discover File Shares
A file share is pretty irresistible to an attacker. Check how Canaries can detect these attacks and alert you to them.
-
May 3, 2024
A Bird’s-eye view: IceID to Dagon Locker (The DFIR Report)
This post focuses on the most recent DFIR Report, IcedID to Dagon Locker Ransomware in 29 Days.
-
January 30, 2024
Defending against the Attack of the Clone[d website]s!
We are releasing two new versions of the token which alert you when an attacker is using an AitM attack against one of your sites.
-
January 18, 2024
What “personality” should I give my Canary?
You can do complex things with Canaries but you don’t need to. Even basic configurations can catch attackers off guard.
Links
-
Help / Knowledge Base
Here you'll find comprehensive guides and answers to common questions to help you get the most out of your Canaries.
-
Canarytokens FAQ
Here you'll find answers to the most frequently asked questions about using and managing Canarytokens.
-
What's New?
Canary is a continually evolving product, and new features, fixes and improvements get rolled out frequently. Catch up with our updates here.
-
Customer Love
Learn what security teams say about Thinkst Canary & Canarytokens and discover first-hand what set us apart.
-
Creating Breadcrumbs for your Canaries
Breadcrumbs are a powerful tool for guiding attackers towards your Canaries.
-
Mass Canarytokens deployment
Canarytokens can be created manually. The purpose of this article is to demonstrate how to automate the process using the simple scripts and the API.
-
Canarytokens - Quick, Free, Detection for the Masses
Canary tokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves).
-
Are Canaries Secure?
Canaries should be harder to compromise than other targets and should leave an attacker no better off for compromising them.
Legal
-
Login
Reset password
Preparing your quote...
Your quote is ready!
Please click here if your download hasn't automatically started.Sorry we couldn't generate your quote.
We still received your contact details and we'll be in touch soon. If you need immediate help, please drop an email to sales@canary.toolsSend us a message
Thanks for contacting us!
We'll be in touch shortly.