Luke Richards

Threat Intelligence Lead

Luke is the Threat Intel Lead for Vectra. He has been with the company for 4 years, joining as a consultant analyst and working with customers and high level incident response directly. Before joining Vectra, Luke was a senior Security Analyst for an international Engineering and Defence contractor where he developed SOC toolsets, processes and incident response playbooks.

All blog posts from this author

Breach

SolarWinds Orion Hack: What To Know & How To Protect Your Network

December 15, 2020
Read blog post
Breach

SolarWinds:知っておくべきこと、すべき対策

December 15, 2020
Read blog post
Threat detection

Putting CVE-2021-1675 PrintNightmare to Rest

July 2, 2021
Read blog post

Luke Richards

Threat Intelligence Lead

Luke is the Threat Intel Lead for Vectra. He has been with the company for 4 years, joining as a consultant analyst and working with customers and high level incident response directly. Before joining Vectra, Luke was a senior Security Analyst for an international Engineering and Defence contractor where he developed SOC toolsets, processes and incident response playbooks.

Posts from

Luke Richards

July 2, 2021
|
By
Luke Richards
Putting CVE-2021-1675 PrintNightmare to Rest

A new remote code execution vulnerability in Windows Print Spooler, now known as CVE-2021-1675, or PrintNightmare can be exploited by attackers to take control of affected systems. Find out how to detect and stop this exploit with Vectra.

Read More
December 15, 2020
|
By
Luke Richards
SolarWinds Orion Hack: What To Know and How to Protect Your Network

Discover what you need to know about the SolarWinds Orions compromise, how it unfolded and why monitoring users in the cloud is imperative to protect your enterprise.

Read More
December 15, 2020
|
By
Luke Richards
SolarWinds: 知っておくべきこと、 すべき対策

SolarWinds社のOrionsを介した攻撃について知っておくべきこと、そして今回の攻撃どのように展開されたのか、そしてクラウド上のユーザーを監視することが企業を保護するために不可欠である理由をご説明します。

Read More