Src |
Date (GMT) |
Titre |
Description |
Tags |
Stories |
Notes |
|
2022-05-31 12:27:03 |
Malicious Life Podcast: Catching A Cybercriminal (lien direct) |
|
|
|
|
|
2022-05-31 12:00:00 |
Webinar June 23rd 2022: Live Attack Simulation - XDR vs. Modern Ransomware (lien direct) |
|
Ransomware
|
|
|
|
2022-05-27 13:11:26 |
Improving SOC Workflows with Cybereason Role-Based Incident Response (lien direct) |
Security Operations Centers (SOCs) are the first line of defense for businesses when responding to cyber attacks. But with SOC teams struggling to find skilled resources coupled with the increasing volume and sophistication of attacks, Defenders must have a well-defined incident response workflow.
|
|
|
|
|
2022-05-26 15:22:06 |
Defend Forward in the Private Sector (lien direct) |
|
|
|
|
|
2022-05-26 13:00:00 |
Cybereason Taps Osamu Yamano as President of Japanese Operations (lien direct) |
|
|
|
|
|
2022-05-25 13:08:21 |
Securing Your Organization\'s Digital Transformation with XDR (lien direct) |
As we all know, the pandemic accelerated many organizations' digital transformation initiatives. According to Help Net Security, many enterprises accelerated their journeys by as many as 3-5 years by building new IT systems to support remote work as well as to keep up with supply and demand. This pace isn't expected to slow down over the years course of 2022. |
|
|
|
|
2022-05-25 12:58:27 |
Cybereason Improves Investigation, Enhances Protection and Infrastructure Management (lien direct) |
Cybereason is constantly innovating to ensure that our customers can achieve the utmost efficacy and efficiency in their security programs. The latest release of the Cybereason Defense Platform is packed with enhancements, including improvements to query results, sensor management, updated workflows, and expanded support for Linux. Customers can read the complete release notes on The Nest. |
|
|
|
|
2022-05-24 15:00:49 |
Malicious Life Podcast: What The LinkedIn Hack Taught Us About Storing Passwords (lien direct) |
|
Hack
|
|
|
|
2022-05-24 14:22:05 |
Targeted by Ransomware? Here are Three Things to Do Straight Away (lien direct) |
Ransomware attacks more than doubled over the course of 2021. In a report shared by PRNewswire, researchers revealed that they had detected 623.3 million attacks globally-318.6 million more attacks than were observed in 2020-an increase of 105%. Looking back even further, ransomware attack volumes grew 232% between 2019 and 2021. |
Ransomware
|
|
|
|
2022-05-23 12:12:52 |
Defend Forward (lien direct) |
|
|
|
|
|
2022-05-18 12:53:20 |
Ransomware: What\'s in a Name? (lien direct) |
|
|
|
|
|
2022-05-17 12:00:00 |
Cyber Defenders Council Report: Defend Forward - A Proactive Model for Cyber Deterrence (lien direct) |
The Defend Forward concept emerged from the US Department of Defense 2018 National Cyber Strategy. Senior Defense Department leaders had grown increasingly concerned about the sophisticated ways in which certain nation-states were bringing together economic coercion, political influence, information operations, cyber operations, and conventional and unconventional military operations to advance their national interests. |
Guideline
|
|
|
|
2022-05-17 08:30:00 |
Malicious Life Podcast: Inside Operation CuckooBees (lien direct) |
|
|
|
|
|
2022-05-17 08:00:00 |
Cybereason Named to CNBC 2022 Disruptor 50 List for Second Consecutive Year (lien direct) |
Cybereason has been named to the exclusive 10th Annual CNBC Disruptor 50 list of the most disruptive private global companies, joining other esteemed rapid-growth companies including Canva, Blockchain.com, Stripe, Chime and more.
|
|
|
|
|
2022-05-16 18:28:08 |
(Déjà vu) Cybereason Named Overall Leader in 2022 KuppingerCole Leadership Compass (lien direct) |
|
Guideline
|
|
|
|
2022-05-16 17:03:08 |
Achieve Faster, More Accurate Response with Cybereason Threat Intelligence (lien direct) |
|
Threat
|
|
|
|
2022-05-16 13:26:55 |
(Déjà vu) Webinar June 2nd 2022: Live Attack Simulation - Ransomware Threat Hunter Series (lien direct) |
|
Threat
Ransomware
|
|
|
|
2022-05-13 13:00:22 |
Behavioral Execution Prevention: Next-Generation Antivirus Evolved (lien direct) |
Defenders around the world need innovative tools to stop sophisticated attacks. Cybereason is excited to announce Behavioral Execution Prevention (BEP), a new layer of NGAV defense designed to stop phishing attacks, zero-day attacks, and drive-by attacks. |
|
|
|
|
2022-05-12 15:54:00 |
Russia Is Waging Cyberwar–with Little Success (lien direct) |
The atrocities taking place in Ukraine are truly tragic. It is personal to me. I've had the opportunity to work alongside cyber experts in Ukraine–providing time and resources over the years to help with cyber deterrence, and I watched anxiously as tensions escalated earlier this year. Russia may have launched its physical invasion of its neighbor on February 24, but Russia and threat actors aligned with Russia have been targeting Ukraine with cyberattacks for years. |
Threat
|
|
★★★★
|
|
2022-05-12 13:00:56 |
Employee Spotlight: Why People are Key to Cybereason Success (lien direct) |
Tim Weis, who was recently promoted to Senior Talent Acquisition Partner, supports hiring for some of our US-based teams and helps each of them scale and grow. Read below to learn more about Tim and why he says this is an exciting time to join Cybereason. |
|
|
★★★
|
|
2022-05-11 12:59:06 |
Harnessing the Power of AI-Driven XDR (lien direct) |
Many security professionals believe they're going to start seeing an uptick in AI-assisted attacks at some point in the near future. According to AIMultiple, 90% of infosec personnel in the U.S. and Japan said they're anticipating an increase in these automated attack campaigns, due in no small part to the public availability of AI research, which attackers are exploiting for their malicious purposes. |
|
|
★★
|
|
2022-05-10 12:25:56 |
New Cybereason Incident Response and Professional Services Bundles Include Unlimited Support (lien direct) |
Cybereason has launched subscription-based bundles for Incident Response (IR) and Professional Services teams that deliver the speed and agility needed to identify, correlate, and quickly contain threats while reducing costs by as much as thirty percent. |
|
|
★★★★
|
|
2022-05-09 13:21:56 |
Malicious Life Podcast: How to Russia-Proof Your Democracy (lien direct) |
In 2007, Estonia–then already a technologically advanced country–suffered a large-scale DDoS attack which crippled many organizations and digital services. Joseph Carson, a Security Scientist and adviser to several governments discusses the lessons learned from that event and how Estonia became what he calls 'A Cloud Country' - check it out… |
|
|
★★
|
|
2022-05-09 12:40:12 |
How Do Ransomware Attacks Impact Victim Organizations\' Stock? (lien direct) |
Ransomware has developed into an extremely lucrative business model with little risk involved for the threat actors. Couple this with the willingness of most victim organizations to pay the ransom demand under the assumption it will return business operations to normal–ultimately encouraging more attacks–and we have a big problem with no easy remedies. |
Threat
Ransomware
|
|
★★★
|
|
2022-05-06 14:24:54 |
The Global Impact of Operation CuckooBees (lien direct) |
Nation-states hack each other. This is the reality we live in and have for some time. The difference is some attacks are more dangerous than others, with a global impact. I'm proud of the research the Cybereason team has unveiled this week on Operation CuckooBees. This research is different. This campaign goes beyond nation-state espionage and has a ripple effect with consequences that impact the global economy. |
Hack
|
|
★★★★
|
|
2022-05-05 13:53:04 |
How the MalOp Can Facilitate New Breach Reporting Rules (lien direct) |
New rules went into effect May 1 that require U.S. financial institutions to report cyber security incidents to regulators within 36 hours. |
|
|
|
|
2022-05-05 13:47:10 |
Webinar May 25th 2022: Organizations at Risk: Ransomware Attackers Don\'t Take Holidays (lien direct) |
Join us for this webinar as we delve into research findings about the risk to organizations from ransomware attacks that occur on weekends and holidays and how you can better prepare to defend against and respond to attacks designed to hit when your organization is most vulnerable. |
Ransomware
|
|
|
|
2022-05-04 04:02:00 |
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation (lien direct) |
Cybersecurity often focuses on malware campaigns or the latest zero-day exploit. Surveys and reports reveal the average cost of a data breach or how much it typically costs to recover from a ransomware attack. Those are the attacks that make noise and capture attention, though. The attacks that fly under the radar are often more insidious and much more costly. |
Ransomware
Data Breach
Malware
|
|
|
|
2022-05-04 04:01:00 |
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques (lien direct) |
In 2021, the Cybereason Nocturnus Incident Response Team investigated multiple intrusions targeting technology and manufacturing companies located in Asia, Europe and North America. Based on the findings of our investigation, it appears that the goal behind these intrusions was to steal sensitive intellectual property for cyber espionage purposes. |
|
APT 41
|
|
|
2022-05-04 04:00:00 |
Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive (lien direct) |
In part one of this research, the Cybereason Nocturnus Incident Response Team provided a unique glimpse into the Wintti intrusion playbook, covering the techniques that were used by the group from initial compromise to stealing the data, as observed and analyzed by the Cybereason Incident Response team. |
Malware
|
APT 41
|
|
|
2022-05-03 13:28:07 |
(Déjà vu) Webinar May 19th 2022: Live Attack Simulation - XDR vs. Modern Ransomware (lien direct) |
Throughout history, sometimes truth ends up being even stranger than fiction. Today's parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. Attackers are operationalizing exploits at a record rate, targeting more organizations and are operating to reduce dwell time. |
Ransomware
|
|
|
|
2022-05-03 13:13:09 |
The U.K. Cyber Strategy: Developing Cybersecurity Skills, Knowledge and Culture (lien direct) |
In the final installment of our five-part blog series on the U.K. Government Cybersecurity Strategy for 2022-2030, we spoke with Greg Day, Cybereason's Vice President and Global Field Chief Information Security Officer (CISO) for the EMEA region, to get his perspective on the strategy's final objective: Developing the right cybersecurity skills, knowledge, and culture. |
|
|
|
|
2022-05-02 18:35:55 |
(Déjà vu) Webinar May 12th 2022: Live Attack Simulation - Ransomware Threat Hunter Series (lien direct) |
Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. |
Threat
Ransomware
|
|
|
|
2022-05-02 13:53:18 |
Malicious Life Podcast: Operation Sundevil and the Birth of the EFF (lien direct) |
In May 1990, officials from several law enforcement agencies gathered in Phoenix, Arizona, to announce a nationwide crackdown on illegal computer activity. This massive operation, carried out by hundreds of Secret Service and FBI agents, was focused on a new type of crime: Hacking.
Yet, as Isaac Newton said, for every action there is an equal and opposite reaction, and the reaction to Operation Sundevil was the birth of a new power in the cybersphere: the Electronic Frontier Foundation - check it out… |
|
|
|
|
2022-04-28 19:29:31 |
Cybereason and Google Cloud: This is XDR Tour (lien direct) |
This is XDR: A Revolution in Five Acts charts the evolution of cybersecurity over the past decade and how it's led to the solution Defenders have been waiting for: Cybereason XDR powered by Google Cloud. |
|
|
|
|
2022-04-28 13:43:29 |
(Déjà vu) The U.K. Cyber Strategy and Minimizing the Impact of Cybersecurity Incidents (lien direct) |
The following is the fourth installment of our blog series outlining how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy for 2022-2030. |
|
|
★★
|
|
2022-04-27 12:52:10 |
Distributed Machine Learning Models Done Right (lien direct) |
One of the core Cybereason products is designed to run on the user's machine and block advanced MalOps (malicious operations) in real-time. This requires a heuristic model, embedded in a C++ application, that runs on millions of machines simultaneously. To complicate things even further, the app runs on machines we don't own and have limited access to. |
|
|
|
|
2022-04-27 12:43:48 |
Why XDR Adoption Should Be a CISO Priority (lien direct) |
At the start of 2022, the results of a survey were published where CISOs and other security leaders shared their top cybersecurity challenges. “Managing increased risk of ransomware/cyber-extortion” came out on top, with 29% of respondents saying this is their biggest concern. |
Guideline
|
|
|
|
2022-04-26 12:45:55 |
The State of Ransomware in the Retail Sector (lien direct) |
How many ransomware attacks did Retailers suffer in 2021? As reported by Infosecurity Magazine, the volume of ransomware attacks grew 105% between 2020 and 2021 to 623 million attack attempts. Much of this growth took place in the Public sector, with government agencies encountering a rise of 1885%. |
Ransomware
|
|
★★
|
|
2022-04-25 13:10:28 |
Malicious Life Podcast: MITRE Attack Flow Project (lien direct) |
The MITRE Attack Flow Project is essentially a new way to visualize, analyze and share knowledge about sequences of adversary behavior. Ingrid Skoog, Ass. Director of R&D at the Center for Threat-Informed Defense, and Cybereason CISO Israel Barak discuss the benefits of the MITRE Attack Flow project to Defenders and executives alike - check it out… |
|
|
|
|
2022-04-25 11:47:39 |
(Déjà vu) THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems (lien direct) |
The Cybereason Global Security Operations Center (GSOC) Team issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them. |
Threat
|
|
|
|
2022-04-22 13:00:01 |
Seven Ways Cybereason Enhances Your Cyber Insurance Investment (lien direct) |
The volume, sophistication, and costs associated with today's cyberattacks, particularly ransomware, are forcing rapid changes in the risk assessment process that insurance carriers undertake to determine a policyholder's overall cyber risk and insurability. |
|
|
|
|
2022-04-21 12:00:00 |
Leveraging Cybereason DFIR to Contain Attacks in Minutes (lien direct) |
Today, many organizations find themselves vulnerable to breaches because security analysts lack the tools to quickly investigate and remediate all aspects of a threat. The modern security toolkit is varied by necessity, with different tools required to effectively perform different tasks. |
|
|
|
|
2022-04-20 12:54:34 |
How Strategic Detections Set XDR Apart (lien direct) |
Data breaches set a record high volume in 2021. According to CNET, 1,862 publicly reported data breaches took place over the course of the year. This volume surpassed the 1,108 data breaches in 2020 and broke the record of 1,506 security incidents set back in 2017. |
|
|
|
|
2022-04-19 15:19:33 |
Malicious Life Podcast: The Aaron Swartz Story (lien direct) |
When 24-year-old Aaron Swartz was caught scraping millions of science articles off of JSTOR, he faced up to 35 years in prison plus a fine of up to 1 million dollars. Did Aaron's crime justify such a harsh punishment? Check it out… |
|
|
|
|
2022-04-19 12:53:51 |
Ransomware Attacks: Can Cyber Insurance Protect Your Organization? (lien direct) |
Cyber insurance premiums have increased significantly over the last few years. Just in October 2021, for instance, TechTarget shared how cyber insurance premiums had increased 50%, with some quotes jumping as high as 100%. |
|
|
|
|
2022-04-14 12:49:45 |
SOC Modernization: Measures and Metrics for Success (lien direct) |
Ask many SoC managers or business leaders how they measure the success of their security operations capabilities, and they will tell you it's the MTTD and MTTR. |
Guideline
|
|
|
|
2022-04-13 19:01:33 |
Everything Cybereason at the 2022 RSA Conference! (lien direct) |
The Cybereason team is excited to have you join us at the 2022 RSA Conference June 6-9, 2022 at the Moscone Center in San Francisco! Don't miss the immersive Cybereason digital experience at booth S-735 in the South Expo Hall. We're showing off the unmatched power and capability of Cybereason XDR powered by Google Cloud with a one-of-a-kind activation. |
|
|
|
|
2022-04-13 15:38:18 |
Webinar April 26th: Profile of the Dark Economy of Ransomware (lien direct) |
Ransomware operators have steadily become more sophisticated and more aligned with nation-state actors making ransomware an existential threat for enterprises. |
Threat
Ransomware
|
|
|
|
2022-04-13 12:37:29 |
Security Budgets Are Increasing - But So Are Attacks (lien direct) |
Most organizations are planning to increase their cybersecurity budgets for 2022. In a 2021 survey covered by Dark Reading, 81% of organizations revealed that they're committed to growing their cybersecurity budgets over the coming year. |
|
|
|