www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:16:27+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog Cybereason advances prevention, data collection, investigation, and management capabilities Cybereason advances prevention, data collection, investigation, and management capabilities ]]> 2023-02-06T17:41:48+00:00 https://www.cybereason.com/blog/cybereason-advances-prevention-data-collection-investigation-and-management-capabilities www.secnews.physaphae.fr/article.php?IdArticle=8307614 False General Information None 3.0000000000000000 CybeReason - Vendor blog You Should Be Afraid of SIM Swaps You Should Be Afraid of SIM Swaps If SIM swap stories ever make the news, almost uniformly, they focus on people who lost a lot of money. But SIM swaps also take a psychological toll. Getting cut off from the grid all of a sudden, not knowing why, not being able to call for help. Even when it's over, you never know if your attackers -- whoever they are -- will come back again. ]]> 2023-01-31T18:19:20+00:00 https://www.cybereason.com/blog/you-should-be-afraid-of-sim-swaps www.secnews.physaphae.fr/article.php?IdArticle=8305964 False None None 3.0000000000000000 CybeReason - Vendor blog FBI vs. REvil [ML BSide] FBI vs. REvil [ML BSide] ]]> 2023-01-24T15:17:03+00:00 https://www.cybereason.com/blog/fbi-vs.-revil-ml-bside www.secnews.physaphae.fr/article.php?IdArticle=8303743 False None None 5.0000000000000000 CybeReason - Vendor blog Cyberbunker, Part 2 Cyberbunker, Part 2 Spamhaus's decision to add Cyberbunker to its list of Spam sources led the Stophaus coalition to initiate a DDoS attack later dubbed “The attack that almost broke the Internet.” The fallout from this attack led to Cyberbunker relocating to a bunker in Germany - but it was the involvement of an Irish drug lord known as 'The Penguin' that led to the bullet-proof hosting company's downfall. ]]> 2023-01-20T17:11:49+00:00 https://www.cybereason.com/blog/cyberbunker-part-2 www.secnews.physaphae.fr/article.php?IdArticle=8302899 False Spam None 2.0000000000000000 CybeReason - Vendor blog 7 Requirements for a Successful XDR Strategy 7 Requirements for a Successful XDR Strategy ]]> 2023-01-19T14:00:00+00:00 https://www.cybereason.com/blog/7-requirements-for-a-successful-xdr-strategy www.secnews.physaphae.fr/article.php?IdArticle=8302593 False None None 2.0000000000000000 CybeReason - Vendor blog Sliver C2 Leveraged by Many Threat Actors Sliver C2 Leveraged by Many Threat Actors What you need to know about this attack framework before it replaces Cobalt Strike ]]> 2023-01-19T13:00:00+00:00 https://www.cybereason.com/blog/sliver-c2-leveraged-by-many-threat-actors www.secnews.physaphae.fr/article.php?IdArticle=8302538 False Threat None 5.0000000000000000 CybeReason - Vendor blog RSA Conference 2023 Promises New Concepts, Diversity of Ideas RSA Conference 2023 Promises New Concepts, Diversity of Ideas The new year is always a time to reflect on what's coming next. As part of the RSA Conference program committee (having worked on the Hackers & Threats track for a number of years), I'm very privileged to see everyone's perspectives. This year I'm happy to report there was a significant growth in the number of submissions suggesting that the collective is starting to look beyond Covid, which definitely hampered the volume and creativity of solutions in recent years.]]> 2023-01-17T15:21:04+00:00 https://www.cybereason.com/blog/rsa-conference-2023-promises-new-concepts-diversity-of-ideas www.secnews.physaphae.fr/article.php?IdArticle=8301896 False None None 2.0000000000000000 CybeReason - Vendor blog Cyberbunker, Part 1 Cyberbunker, Part 1 Sven Kamphuis and Herman Johan Xennt are quite dissimilar: one is young, the other is old, one is a Freedom Fighter, the other a businessman. In 1996, their unlikely partnership coalesced around a mutual deep hatred towards authority - and around a very unusual building: a Cold-War era nuclear bunker.   ]]> 2023-01-11T19:45:06+00:00 https://www.cybereason.com/blog/cyberbunker-part-1 www.secnews.physaphae.fr/article.php?IdArticle=8300307 False None None 2.0000000000000000 CybeReason - Vendor blog THREAT ANALYSIS: From IcedID to Domain Compromise THREAT ANALYSIS: From IcedID to Domain Compromise BACKGROUND In this Threat Analysis report, the Cybereason team investigates a recent IcedID infection that illustrates the tactics, techniques, and procedures (TTPs) used in a recent campaign. IcedID, also known as BokBot, is traditionally known as a banking trojan used to steal financial information from its victims. It has been around since at least 2017 and has been tied to the threat group TA551. ]]> 2023-01-10T12:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-from-icedid-to-domain-compromise www.secnews.physaphae.fr/article.php?IdArticle=8299550 False Threat None 4.0000000000000000 CybeReason - Vendor blog MITRE ATT&CK and the Art of Building Better Defenses MITRE ATT&CK and the Art of Building Better Defenses MITRE's Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a critical tool for security practitioners seeking to understand how attackers move, operate, and conduct their attacks. Designed to look at attacks from the attacker's perspective, it catalogs the attack lifecycle of different adversaries and the platforms they choose to target, all based on real-world observations.]]> 2023-01-09T18:47:58+00:00 https://www.cybereason.com/blog/mitre-attck-and-the-art-of-building-better-defenses www.secnews.physaphae.fr/article.php?IdArticle=8299313 False Tool None 2.0000000000000000 CybeReason - Vendor blog How Netflix Learned Cloud Security [ML B-Side] How Netflix Learned Cloud Security [ML B-Side] 2011 was a pivotal year for Netflix: the now hugely successful company was then in the midst of a formidable transformation, changing from a mail-based DVD rental service to the modern streaming service that it is today. It was at this crucial point in the company's history that Jason Chan, our guest in this episode, was hired by Netflix to lay the foundations for its cloud security protocols. Nate Nelson, our Sr. Producer, spoke with Jason about the decade he spent at the company, what he learned during his tenure there, and the ideas that took shape at that time, such as Chaos Engineering. ]]> 2023-01-03T17:01:06+00:00 https://www.cybereason.com/blog/how-netflix-learned-cloud-security-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8297497 False None None 2.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] Malicious Life Podcast: Fred Cohen, The Godfather of Computer Viruses [ML B-Side] In his 1984 seminal paper - Computer Viruses: Theory and Experiments - Dr. Fred Cohen not only introduced the name 'computer virus', a term invented by his mentor, Leonard Adelman, but was also the first to analyze computer viruses in a rigorous mathematical way, proving that computer viruses were not only practical - but that they were in fact inevitable. Nate Nelson, our Sr. producer, spoke with Dr. Cohen about his early research into computer viruses, his work with the US army, the panicky response from the US government - and the parallels between computer viruses and mental viruses - i.e. memes.]]> 2022-12-19T21:40:03+00:00 https://www.cybereason.com/blog/malicious-life-podcast-fred-cohen-the-godfather-of-computer-viruses-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8292879 False None None 2.0000000000000000 CybeReason - Vendor blog Royal Rumble: Analysis of Royal Ransomware Royal Rumble: Analysis of Royal Ransomware The Royal ransomware group emerged in early 2022 and has gained momentum since the middle of the year. Its ransomware, which the group deploys through different TTPs, has impacted multiple organizations across the globe. The group itself is suspected of consisting of former members of other ransomware groups, based on similarities researchers have observed between Royal ransomware and other ransomware operators.]]> 2022-12-14T13:40:44+00:00 https://www.cybereason.com/blog/royal-ransomware-analysis www.secnews.physaphae.fr/article.php?IdArticle=8291208 True Ransomware None 3.0000000000000000 CybeReason - Vendor blog Case Study: How Cybereason MDR Improved Olist\'s Triage & Response Time Case Study: How Cybereason MDR Improved Olist's Triage & Response Time Olist, a Brazilian e-commerce marketplace integrator, is one of the fastest-growing eCommerce platforms in the world. Last year, for example, it closed four acquisitions and tripled in size. Today, it is rapidly expanding beyond Brazil.]]> 2022-12-13T19:44:39+00:00 https://www.cybereason.com/blog/how-cybereason-mdr-improved-olists-triage-response-time www.secnews.physaphae.fr/article.php?IdArticle=8290927 False None None 2.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Thamar Reservoir Malicious Life Podcast: Thamar Reservoir Thamar Gindin is an Israeli scholar whose research focuses on the Persian language. For the past seven years (at least) Thamar has been a target for an endless stream of spear-phishing attempts by the Iranian regime, trying to take over her email account and lure her away from her country's borders. Her family, friends, and colleagues have also suffered numerous attacks. So, how does it feel to live for years with a virtual target mark on your back?… ]]> 2022-12-13T17:30:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-thamar-reservoir www.secnews.physaphae.fr/article.php?IdArticle=8290762 False None None 2.0000000000000000 CybeReason - Vendor blog Ransomware: Which Industries Are Most Likely to Pay Ransomware: Which Industries Are Most Likely to Pay A recent study by Cybereason, Ransomware: The True Cost to Business 2022, revealed that 73% of respondents had experienced a ransomware attack in the last 24 months. Of those respondents, 28% said their organizations paid the ransom. A separate survey of cybersecurity leaders conducted by WSJ Pro Research found that 42.5% of respondents said they would consider paying a ransom.]]> 2022-12-12T11:00:00+00:00 https://www.cybereason.com/blog/ransomware-which-industries-are-most-likely-to-pay www.secnews.physaphae.fr/article.php?IdArticle=8290246 False Ransomware,Guideline None 4.0000000000000000 CybeReason - Vendor blog What Healthcare CISOs Can Do Differently to Fight Ransomware What Healthcare CISOs Can Do Differently to Fight Ransomware Ransomware attacks cost the healthcare industry over $20 billion in 2020 and show no sign of slowing down. “The current outlook is terrible,” says Israel Barak, CISO of Cybereason. “We are seeing the industry experience an extremely sharp increase in both the quantity and level of sophistication of these attacks.”]]> 2022-12-07T12:00:00+00:00 https://www.cybereason.com/blog/ransomware-what-healthcare-cisos-can-do-differently www.secnews.physaphae.fr/article.php?IdArticle=8288641 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] The Problem With Kernel-Mode Anti-Cheat Software [ML B-Side] Nobody likes cheaters, especially in video games: we play games to have fun, and nothing hurts the joy of playing a good game more than losing to a cheater. That is why EA is not the only publisher to implement kernel-mode anti-cheat software in their games: League of Legends and Valorant, for example, use similar software. Yet some people warn that installing such kernel-level systems is extremely dangerous. So, what's the problem with kernel-mode anti-cheat software?]]> 2022-12-06T19:48:35+00:00 https://www.cybereason.com/blog/the-problem-with-kernel-mode-anti-cheat-software-ml-b-side www.secnews.physaphae.fr/article.php?IdArticle=8288365 False None None 3.0000000000000000 CybeReason - Vendor blog Threat Analysis: MSI - Masquerading as a Software Installer Threat Analysis: MSI - Masquerading as a Software Installer ]]> 2022-12-05T06:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-msi-masquerading-as-software-installer www.secnews.physaphae.fr/article.php?IdArticle=8287706 False Threat,Threat None 3.0000000000000000 CybeReason - Vendor blog FBI, CISA Issue Warning on Cuba Ransomware FBI, CISA Issue Warning on Cuba Ransomware ]]> 2022-12-02T13:00:00+00:00 https://www.cybereason.com/blog/fbi-cisa-warning-on-cuba-ransomware www.secnews.physaphae.fr/article.php?IdArticle=8286625 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Nine Cybersecurity Predictions for 2023 Nine Cybersecurity Predictions for 2023 In 2022, ransomware continued to reign king and became one of the most common and dangerous threats facing healthcare organizations and software supply chains. The war on Ukraine created heightened concern over zero-day threats wreaking havoc for organizations worldwide. The cyber gang Conti with Russian-linked ties managed to disrupt financial operations throughout Costa Rica, and it seems there is no end in sight to the hacking group Lapsus$, which has proven itself to be a formidable threat actor. ]]> 2022-12-01T11:00:00+00:00 https://www.cybereason.com/blog/nine-cybersecurity-predictions-for-2023 www.secnews.physaphae.fr/article.php?IdArticle=8286221 False Ransomware,Threat None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: How to NOT Build a Cybersecurity Startup malicious life podcast norse corp cybersecurity startup When it was founded in 2011, Norse Corp.-which described itself as "the world's largest dedicated threat intelligence network"-had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millions of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?]]> 2022-11-29T16:09:58+00:00 https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup www.secnews.physaphae.fr/article.php?IdArticle=8282772 False Threat None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: Jailbreaking Tractors Malicious Life podcast Jailbreaking tractors John Deere, an American agricultural machinery manufacturer, has recently enraged many farmers and digital rights activists due to the restrictive fixing policy of its tractors. Now, an Australian white hat hacker named Sick Codes has demonstrated not only how he was able to jailbreak the company's tractors and run Doom on them (because why not) - but also hack into its global operations center, demonstrating how hackers can easily take over a huge number of farming machines all over the world.]]> 2022-11-28T14:37:31+00:00 https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors www.secnews.physaphae.fr/article.php?IdArticle=8271825 False Hack None 3.0000000000000000 CybeReason - Vendor blog The Russian Business Network The Russian Business Network In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a 'bullet-proof' hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government's years-old tradition of collaborating with organized crime, it's no wonder that the Russian Business Network quickly became Putin's informal cyber attack arm. ]]> 2022-11-25T13:00:00+00:00 https://www.cybereason.com/blog/the-russian-business-network www.secnews.physaphae.fr/article.php?IdArticle=8218368 False None None 3.0000000000000000 CybeReason - Vendor blog What Can Chess Grandmasters Teach Us About Cyber What Can Chess Grandmasters Teach Us About Cyber ]]> 2022-11-24T13:00:00+00:00 https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber www.secnews.physaphae.fr/article.php?IdArticle=8199318 False None None 4.0000000000000000 CybeReason - Vendor blog THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies The Cybereason Global SOC (GSOC) team is investigating Qakbot infections observed in customer environments related to a potentially widespread ransomware campaign run by Black Basta. The campaign is primarily targeting U.S.-based companies. ]]> 2022-11-23T05:01:00+00:00 https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies www.secnews.physaphae.fr/article.php?IdArticle=8173270 False Ransomware None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: What Would Happen If CBS Got Hacked? Malicious Life Podcast: What Would Happen If CBS Got Hacked? Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media companies are more public facing by their very nature. How can these organizations be hacked, and why should we care about such attacks? Nate Nelson spoke with Joel Molinoff, former chief information risk officer for CBS Corporation, and Dan Vasile, former vice president of information security at Paramount. ]]> 2022-11-22T11:00:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked www.secnews.physaphae.fr/article.php?IdArticle=8159304 False None None 3.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: LabMD vs. The FTC Malicious Life Podcast LabMD vs FTC One day in 2008, Michael Daugherty - CEO and owner of LabMD, a cancer detection lab - got a call from an executive of TiVera, a cybersecurity company. The caller said that a file containing private medical data of some 9000 of LabMD's patients has been discovered online. When Michael refused to pay for TiVersa's hefty "consultation fee", it reported the incident to the FTC. This was the beginning of a ten-year-long legal battle that ultimately destroyed LabMD - but cost the Federal Agency dearly.]]> 2022-11-18T17:00:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc www.secnews.physaphae.fr/article.php?IdArticle=8091473 False None None None CybeReason - Vendor blog Holiday, Weekend Ransomware Attacks Continue to Hit Companies Hard impact of holiday weekend ransomware attacks As the holidays approach, security leaders wanting to give their teams some much deserved extra time off may get caught in a bind. After all, ransomware actors love to wreak havoc when organizations' human defenses are trying to sleep in heavenly peace. ]]> 2022-11-16T11:00:00+00:00 https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard www.secnews.physaphae.fr/article.php?IdArticle=8045378 False Ransomware,Guideline None None CybeReason - Vendor blog NGAV Redefined: 9 Layers of Unparalleled Attack Protection NGAV Redefined: 9 Layers of Unparalleled Attack Protection Introduction ]]> 2022-11-14T15:50:49+00:00 https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection www.secnews.physaphae.fr/article.php?IdArticle=8010918 False None None 3.0000000000000000 CybeReason - Vendor blog A Message to All Defenders This Veterans Day Veterans Day Message to All Cybersecurity and National Security Defenders I'm Dan Verton, Director of Content Marketing at Cybereason and a proud veteran of the United States Marine Corps. On behalf of my U.S.-based colleagues at Cybereason, I want to extend our sincere gratitude and appreciation to all who have answered our nation's call to service. ]]> 2022-11-11T13:00:00+00:00 https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day www.secnews.physaphae.fr/article.php?IdArticle=7948542 False None None None CybeReason - Vendor blog Machine Timeline Enhancements Improve Investigation Workflows Machine Timeline Enhancements Improve Investigation Workflows In July, Cybereason announced the release of the Process Timeline feature, now known as Machine Timeline, since it shows a unified timeline of events on a machine of interest around the time of a key or “lead event.” Today, Cybereason is excited to announce a series of enhancements in the Machine Timeline feature to improve investigation workflows further.]]> 2022-11-01T20:06:53+00:00 https://www.cybereason.com/blog/machine-timeline-enhancements-improve-investigation-workflows www.secnews.physaphae.fr/article.php?IdArticle=7769271 False Guideline None None CybeReason - Vendor blog Cybereason Announces Organizational Updates Cybereason Announces Organizational Updates ]]> 2022-10-26T21:02:07+00:00 https://www.cybereason.com/blog/cybereason-announces-organizational-updates www.secnews.physaphae.fr/article.php?IdArticle=7691337 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: DLL Side-Loading Widely (Ab)Used THREAT ANALYSIS REPORT: DLL Side-Loading Widely (Ab)Used This Threat Analysis Report is part of the Purple Team Series. In this series, the Managed Detection and Response (MDR) and Threat Intelligence teams from the Cybereason Global Security Operations Center (GSOC) explore widely used attack techniques, outline how threat actors leverage these techniques, describe how to reproduce an attack, and report how defenders can detect and prevent these attacks.]]> 2022-10-21T12:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-dll-side-loading-widely-abused www.secnews.physaphae.fr/article.php?IdArticle=7604633 False Threat None None CybeReason - Vendor blog Operationalizing MITRE ATT&CK: A New Wave is Here Operationalizing MITRE ATT&CK: A New Wave is Here If you want to build and maintain a heatmap of your organization's detection coverage, it requires a mixture of art, science, and actionable transparency from your security vendors. Today, the MITRE ATT&CK Framework has become the de-facto language for how we communicate, analyze, and attribute adversary activity. ]]> 2022-10-19T12:00:00+00:00 https://www.cybereason.com/blog/operationalize-mitre-attack-new-tidal-cyber-wave www.secnews.physaphae.fr/article.php?IdArticle=7560419 False None None None CybeReason - Vendor blog Malicious Life Podcast: Hacking Stock Markets Part 2 Malicious Life Podcast: Hacking Stock Markets Part 2 ]]> 2022-10-18T18:47:44+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacking-stock-markets-part-2 www.secnews.physaphae.fr/article.php?IdArticle=7545211 False None None None CybeReason - Vendor blog Telcos: The Supply Chain Attack You\'re Not Ready For Telcos: The Supply Chain Attack You're Not Ready For ]]> 2022-10-18T15:53:02+00:00 https://www.cybereason.com/blog/telcos-the-supply-chain-attack-youre-not-ready-for www.secnews.physaphae.fr/article.php?IdArticle=7543501 False None None None CybeReason - Vendor blog Indicators of Behavior and the Diminishing Value of IOCs Indicators of Behavior and the Diminishing Value of IOCs ]]> 2022-10-12T14:30:05+00:00 https://www.cybereason.com/blog/indicators-of-behavior-and-the-diminishing-value-of-iocs www.secnews.physaphae.fr/article.php?IdArticle=7415880 False None None None CybeReason - Vendor blog Why NGAV Displaced Traditional Antivirus Tools Why NGAV Displaced Traditional Antivirus Tools Next-generation antivirus (NGAV) solutions are quickly replacing outmoded signature-based antivirus tools, and ransomware has a lot to do with it. Traditional AV tools fall short considering what we're up against when we look at the true cost of ransomware attacks for business, and why this change was inevitable.]]> 2022-10-11T13:51:43+00:00 https://www.cybereason.com/blog/why-ngav-displaced-traditional-antivirus-tools www.secnews.physaphae.fr/article.php?IdArticle=7393320 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Vishing Voice Scams Malicious Life Podcast: Vishing Voice Scams ]]> 2022-10-11T13:13:14+00:00 https://www.cybereason.com/blog/malicious-life-podcast-vishing-voice-scams www.secnews.physaphae.fr/article.php?IdArticle=7393321 False None None None CybeReason - Vendor blog Cybersecurity Accountability Regulation? Your Opinion Matters… Cybersecurity Accountability Regulation? Your Opinion Matters… Harvard Business Review (HBR) recently published an article that tackles the same topic as the latest Cyber Defenders Council report: cybersecurity regulation. The HBR article explores the complexities of incident reporting regulation, while the Cyber Defenders Council report delves into the pros and cons of cybersecurity accountability regulation.]]> 2022-10-06T14:21:59+00:00 https://www.cybereason.com/blog/cybersecurity-accountability-regulation-your-opinion-matters- www.secnews.physaphae.fr/article.php?IdArticle=7320225 False None None None CybeReason - Vendor blog Ten Ways to Make Your Security Operations More Efficient Ten Ways to Make Your Security Operations More Efficient ]]> 2022-10-06T14:11:03+00:00 https://www.cybereason.com/blog/10-ways-to-make-your-security-operations-more-efficient www.secnews.physaphae.fr/article.php?IdArticle=7320226 False None None None CybeReason - Vendor blog Container Escape: All You Need is Cap (Capabilities) Container Escape: All You Need is Cap (Capabilities) ]]> 2022-10-05T14:27:36+00:00 https://www.cybereason.com/blog/container-escape-all-you-need-is-cap-capabilities www.secnews.physaphae.fr/article.php?IdArticle=7308741 False None None None CybeReason - Vendor blog Leveraging Indicators of Behavior for Early Detection Leveraging Indicators of Behavior for Early Detection ]]> 2022-10-05T14:18:33+00:00 https://www.cybereason.com/blog/leveraging-indicators-of-behavior-for-early-detection www.secnews.physaphae.fr/article.php?IdArticle=7307702 False None None None CybeReason - Vendor blog Blue Teaming on macOS with eslogger Blue Teaming on macOS with eslogger ]]> 2022-10-04T14:57:39+00:00 https://www.cybereason.com/blog/blue-teaming-on-macos-with-eslogger www.secnews.physaphae.fr/article.php?IdArticle=7297123 False None None None CybeReason - Vendor blog Malicious Life Podcast: Hacking Stock Markets Part 1 Malicious Life Podcast: Hacking Stock Markets Part 1 In any trading market–at any time in history, no matter where you are–the most important thing you can possess isn't actually money, or influence, or anything like that. Knowledge– in particular, knowing something before everybody else–is far more valuable. ]]> 2022-10-04T14:51:23+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacking-stock-markets-part-1 www.secnews.physaphae.fr/article.php?IdArticle=7297124 False None None None CybeReason - Vendor blog THREAT ALERT: ProxyNotShell - Two Critical Vulnerabilities Affecting MS Exchange THREAT ALERT: ProxyNotShell - Two Critical Vulnerabilities Affecting MS Exchange ]]> 2022-10-03T20:06:57+00:00 https://www.cybereason.com/blog/threat-alert-proxynotshell-two-critical-vulnerabilities-affecting-ms-exchange www.secnews.physaphae.fr/article.php?IdArticle=7291069 False None None None CybeReason - Vendor blog A Guide to More Efficient and Effective SOC Teams A Guide to More Efficient and Effective SOC Teams ]]> 2022-10-03T19:54:00+00:00 https://www.cybereason.com/blog/a-guide-to-more-efficient-effective-soc-teams www.secnews.physaphae.fr/article.php?IdArticle=7291070 False None None None CybeReason - Vendor blog Malicious Life Wins Big at the 17th Annual People\'s Choice Podcast Awards Malicious Life Wins Big at the 17th Annual People's Choice Podcast Awards ]]> 2022-10-03T15:23:27+00:00 https://www.cybereason.com/blog/malicious-life-wins-big-at-the-17th-annual-peoples-choice-podcast-awards www.secnews.physaphae.fr/article.php?IdArticle=7289150 False None None None CybeReason - Vendor blog Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks ]]> 2022-09-30T15:51:41+00:00 https://www.cybereason.com/blog/webinar-october-18th-2022-the-true-cost-of-ransomware-evaluating-risk-and-how-to-avoid-attacks www.secnews.physaphae.fr/article.php?IdArticle=7227866 False Ransomware None None CybeReason - Vendor blog Cloud Authentication: A Guide to Choosing the Right Solution Cloud Authentication: A Guide to Choosing the Right Solution ]]> 2022-09-29T14:45:37+00:00 https://www.cybereason.com/blog/cloud-authentication-a-guide-to-choosing-the-right-solution www.secnews.physaphae.fr/article.php?IdArticle=7205096 False None None None CybeReason - Vendor blog Webinar October 13th 2022: Ten Considerations for More Efficient Security Webinar October 13th 2022: Ten Considerations for More Efficient Security ]]> 2022-09-29T10:00:00+00:00 https://www.cybereason.com/blog/webinar-october-13th-2022-ten-considerations-for-more-efficient-security www.secnews.physaphae.fr/article.php?IdArticle=7205097 False None None None CybeReason - Vendor blog Malicious Life Podcast: What It\'s Like to Fight LulzSec Malicious Life Podcast: What It's Like to Fight LulzSec ]]> 2022-09-28T14:52:19+00:00 https://www.cybereason.com/blog/malicious-life-podcast-what-its-like-to-fight-lulzsec www.secnews.physaphae.fr/article.php?IdArticle=7182525 False None None None CybeReason - Vendor blog White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection ]]> 2022-09-27T14:44:26+00:00 https://www.cybereason.com/blog/white-paper-operation-centric-security-leveraging-indicators-of-behavior-for-early-detection www.secnews.physaphae.fr/article.php?IdArticle=7161503 False None None None CybeReason - Vendor blog Defending Against Supply Chain and Ransomware Attacks Defending Against Supply Chain and Ransomware Attacks “The level of damage associated with ransomware-based supply chain attacks has never been higher,” warned a recent article. These attacks are so disruptive because, as one consultancy firm revealed, the average company has 3,000 suppliers per $1 billion US in spend. That means when it comes to ransomware attacks, you're considering the security of up to thousands of other networks besides your own. ]]> 2022-09-27T14:43:58+00:00 https://www.cybereason.com/blog/defending-against-supply-chain-and-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=7161504 False Ransomware None None CybeReason - Vendor blog Cybereason Announces Private Infrastructure Protection Version 21.2 Cybereason Announces Private Infrastructure Protection Version 21.2 ]]> 2022-09-26T20:21:17+00:00 https://www.cybereason.com/blog/cybereason-announces-private-infrastructure-protection-version-21.2 www.secnews.physaphae.fr/article.php?IdArticle=7154673 False None None None CybeReason - Vendor blog Next Generation Antivirus Prevention Redefined Next Generation Antivirus Prevention Redefined ]]> 2022-09-22T12:30:00+00:00 https://www.cybereason.com/blog/next-generation-antivirus-prevention-redefined www.secnews.physaphae.fr/article.php?IdArticle=7062653 False None None None CybeReason - Vendor blog How XDR Reduces the Total Cost of Security Operations How XDR Reduces the Total Cost of Security Operations Ransomware is on the loose, with an attack occurring every 11 seconds on average and causing one in three affected organizations to shell out anywhere from $350,000 and $1.4 million. As ransomware gets both more accessible (RaaS) and increasingly sophisticated (RansomOps), security requirements need to advance along with it. ]]> 2022-09-21T14:17:38+00:00 https://www.cybereason.com/blog/how-xdr-reduces-the-total-cost-of-security-operations www.secnews.physaphae.fr/article.php?IdArticle=7042320 False Ransomware None None CybeReason - Vendor blog Webinar October 26th 2022: NGAV Redefined Webinar October 26th 2022: NGAV Redefined ]]> 2022-09-21T14:09:25+00:00 https://www.cybereason.com/blog/webinar-october-26th-2022-ngav-redefined www.secnews.physaphae.fr/article.php?IdArticle=7040344 False None None None CybeReason - Vendor blog Cyber Defenders Council: Is it Time for Cybersecurity Regulation? Cyber Defenders Council: Is it Time for Cybersecurity Regulation? ]]> 2022-09-20T12:00:00+00:00 https://www.cybereason.com/blog/cyber-defenders-council-is-it-time-for-cybersecurity-regulation www.secnews.physaphae.fr/article.php?IdArticle=7014937 False None None None CybeReason - Vendor blog Preparing Your Organization for a Ransomware Attack Preparing Your Organization for a Ransomware Attack As ransomware gangs continue moving towards highly targeted attacks, enterprises need to be more wary than ever about making sure their organizations are as prepared as possible to defend against a ransomware attack. RansomOps are now the modus operandi among even the biggest players, and it's changing the game. ]]> 2022-09-20T08:00:00+00:00 https://www.cybereason.com/blog/preparing-your-organization-for-a-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=7016796 False Ransomware None None CybeReason - Vendor blog Workforce Challenges are Here to Stay: Time to Think about MDR Workforce Challenges are Here to Stay: Time to Think about MDR ]]> 2022-09-20T07:00:00+00:00 https://www.cybereason.com/blog/workforce-challenges-are-here-to-stay-time-to-think-about-mdr www.secnews.physaphae.fr/article.php?IdArticle=7018691 False None None None CybeReason - Vendor blog Malicious Life Podcast: King Kimble - Kim DotCom Malicious Life Podcast: King Kimble - Kim DotCom ]]> 2022-09-19T14:54:12+00:00 https://www.cybereason.com/blog/malicious-life-podcast-king-kimble-kim-dotcom www.secnews.physaphae.fr/article.php?IdArticle=7003922 False None None None CybeReason - Vendor blog Ransomware Head to Head: Don\'t Follow the CRWD Ransomware Head to Head: Don't Follow the CRWD ]]> 2022-09-15T13:33:19+00:00 https://www.cybereason.com/blog/ransomware-head-to-head-dont-follow-the-crwd www.secnews.physaphae.fr/article.php?IdArticle=6910538 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence ]]> 2022-09-14T18:33:43+00:00 https://www.cybereason.com/blog/threat-analysis-report-abusing-notepad-plugins-for-evasion-and-persistence www.secnews.physaphae.fr/article.php?IdArticle=6895070 False None None None CybeReason - Vendor blog AI/ML as a Security Team Force Multiplier AI/ML as a Security Team Force Multiplier ]]> 2022-09-14T14:18:22+00:00 https://www.cybereason.com/blog/ai/ml-as-a-security-team-force-multiplier www.secnews.physaphae.fr/article.php?IdArticle=6891471 False None None None CybeReason - Vendor blog Reimagining the SOC: A Lesson From the Military on 9/11 Reimagining the SOC: A Lesson From the Military on 9/11 To sustain the fight against a decentralized global enemy in cyberspace, the modern Security Operations Center (SOC) must engage in a change management experiment to become more agile and reimagine the tools and processes at its disposal. ]]> 2022-09-14T14:14:41+00:00 https://www.cybereason.com/blog/reimagining-the-soc-a-lesson-from-the-military-on-9/11 www.secnews.physaphae.fr/article.php?IdArticle=6891472 False None None None CybeReason - Vendor blog Malicious Life Podcast: Hacking Multi-Factor Authentication Malicious Life Podcast: Hacking Multi-Factor Authentication ]]> 2022-09-13T14:38:40+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacking-multi-factor-authentication www.secnews.physaphae.fr/article.php?IdArticle=6871298 False None None None CybeReason - Vendor blog Leveraging XDR for Cloud Workload Protection Leveraging XDR for Cloud Workload Protection The worldwide public cloud computing market is projected to reach nearly $500 billion USD this year, with projections to clear nearly $600 billion next year. It's no surprise, given that nine out of ten survey respondents reported using at least one cloud service. ]]> 2022-09-13T14:25:15+00:00 https://www.cybereason.com/blog/leveraging-xdr-for-cloud-workload-protection www.secnews.physaphae.fr/article.php?IdArticle=6871299 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: PlugX RAT Loader Evolution THREAT ANALYSIS REPORT: PlugX RAT Loader Evolution ]]> 2022-09-08T10:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-plugx-rat-loader-evolution www.secnews.physaphae.fr/article.php?IdArticle=6783080 False None None None CybeReason - Vendor blog The Cybereason Approach to Sensor Tamper Protection The Cybereason Approach to Sensor Tamper Protection ]]> 2022-09-07T15:48:39+00:00 https://www.cybereason.com/blog/the-cybereason-approach-to-sensor-tamper-protection www.secnews.physaphae.fr/article.php?IdArticle=6769846 False None None None CybeReason - Vendor blog How XDR Solves Key Challenges Facing Security Teams How XDR Solves Key Challenges Facing Security Teams ]]> 2022-09-07T14:38:20+00:00 https://www.cybereason.com/blog/how-xdr-solves-key-challenges-facing-security-teams www.secnews.physaphae.fr/article.php?IdArticle=6769847 False None None None CybeReason - Vendor blog Malicious Life Podcast: Hacking Language Models Malicious Life Podcast: Hacking Language Models Language models are everywhere today: they run in the background of Google Translate and other translation tools, they help operate voice assistants like Alexa or Siri, and most interestingly they are available via several experiential projects trying to emulate natural conversations such as OpenAI's GPT-3 and Google's LaMDA. Can these models be hacked to gain access to the sensitive information they learned from their training data? Check it out...]]> 2022-09-06T15:01:28+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacking-language-models www.secnews.physaphae.fr/article.php?IdArticle=6752137 False None None None CybeReason - Vendor blog RansomOps vs. Extended Detection and Response RansomOps vs. Extended Detection and Response With nearly four out of ten global organizations admitting to being victims of a ransomware attack in 2021 alone, it's apparent that complex ransomware operations–or RansomOps–are only going to become a bigger part of the cybersecurity dialogue than they already are. ]]> 2022-09-06T14:20:24+00:00 https://www.cybereason.com/blog/ransomops-vs.-extended-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=6752138 False Ransomware None None CybeReason - Vendor blog Attack on Montenegro Further Evidence of Nation-State and Cybercriminal Crossover Attack on Montenegro Further Evidence of Nation-State and Cybercriminal Crossover ]]> 2022-09-01T15:31:18+00:00 https://www.cybereason.com/blog/attack-on-montenegro-further-evidence-of-nation-state-and-cybercriminal-crossover www.secnews.physaphae.fr/article.php?IdArticle=6666876 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector ]]> 2022-09-01T10:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector www.secnews.physaphae.fr/article.php?IdArticle=6662064 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Software Bill of Materials (SBOM) Malicious Life Podcast: Software Bill of Materials (SBOM) ]]> 2022-08-31T15:08:31+00:00 https://www.cybereason.com/blog/malicious-life-podcast-software-bill-of-materials-sbom www.secnews.physaphae.fr/article.php?IdArticle=6647968 False None None None CybeReason - Vendor blog The Importance of Actionable Threat Intelligence The Importance of Actionable Threat Intelligence ]]> 2022-08-31T14:41:39+00:00 https://www.cybereason.com/blog/the-importance-of-actionable-threat-intelligence www.secnews.physaphae.fr/article.php?IdArticle=6647969 False Threat None None CybeReason - Vendor blog Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies Webinar Thursday September 8th 2022: Ransomware Impact on Incident Response Strategies ]]> 2022-08-30T15:11:46+00:00 https://www.cybereason.com/blog/webinar-thursday-september-8th-2022-ransomware-impact-on-incident-response-strategies www.secnews.physaphae.fr/article.php?IdArticle=6627829 True Ransomware None None CybeReason - Vendor blog Hackers vs. Attackers: It\'s Not Always Black and White Hackers vs. Attackers: It's Not Always Black and White ]]> 2022-08-30T14:08:01+00:00 https://www.cybereason.com/blog/hackers-vs.-attackers-its-not-always-black-and-white www.secnews.physaphae.fr/article.php?IdArticle=6627830 False None None None CybeReason - Vendor blog Cybereason MDR: Fast, Efficient, Effective Cybereason MDR: Fast, Efficient, Effective ]]> 2022-08-25T16:28:29+00:00 https://www.cybereason.com/blog/cybereasons-malop-severity-score-extended-response www.secnews.physaphae.fr/article.php?IdArticle=6524294 False None None None CybeReason - Vendor blog THREAT ALERT: HavanaCrypt Ransomware Masquerading as Google Update THREAT ALERT: HavanaCrypt Ransomware Masquerading as Google Update ]]> 2022-08-22T19:06:21+00:00 https://www.cybereason.com/blog/threat-alert-havanacrypt-ransomware-masquerading-as-google-update www.secnews.physaphae.fr/article.php?IdArticle=6475486 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Leo Kuvayev– The Czar of Spammers Malicious Life Podcast: Leo Kuvayev– The Czar of Spammers Criminals, particularly cybercriminals, aren't “good people,” but in most cases, they do have their own personal boundaries, so every once in a while you encounter a criminal who's different–someone who seems not to have limits at all. A ruthless person, for whom the end truly justifies the means. Leo Kuvayev is that kind of a person - and that made him so successful as a cyber-criminal. But even a genius criminal can go just one step too far - check it out... ]]> 2022-08-22T14:07:12+00:00 https://www.cybereason.com/blog/malicious-life-podcast-leo-kuvayev-the-czar-of-spammers www.secnews.physaphae.fr/article.php?IdArticle=6473616 False None None None CybeReason - Vendor blog THREAT ALERT: Inside the Redeemer 2.0 Ransomware THREAT ALERT: Inside the Redeemer 2.0 Ransomware The Cybereason Global Security Operations Center (SOC) Team issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them. In this article, the Cybereason Research team exposes Redeemer 2.0, an updated version of the original ransomware.]]> 2022-08-19T14:57:16+00:00 https://www.cybereason.com/blog/threat-alert-inside-the-redeemer-2.0-ransomware www.secnews.physaphae.fr/article.php?IdArticle=6415545 False Ransomware,Threat None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control THREAT ANALYSIS REPORT: Bumblebee Loader – The High Road to Enterprise Domain Control ]]> 2022-08-17T10:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-bumblebee-loader-the-high-road-to-enterprise-domain-control www.secnews.physaphae.fr/article.php?IdArticle=6371903 False None None None CybeReason - Vendor blog Why Detection Efficacy Should Be in Your Top Metrics Why Detection Efficacy Should Be in Your Top Metrics Over the years I have seen hundreds of companies trial and deploy cybersecurity capabilities, and whilst these evolve, the selection criteria and metrics of success has stayed more static. Meeting with executives at events such as the World Economic Forum, I often get asked what is the one metric I should use to measure success. ]]> 2022-08-16T14:11:33+00:00 https://www.cybereason.com/blog/why-detection-efficacy-should-be-in-your-top-metrics www.secnews.physaphae.fr/article.php?IdArticle=6354840 False None None None CybeReason - Vendor blog Malicious Life Podcast: A CISO\'s Nightmare - Israel Baron on Railway Security Malicious Life Podcast: A CISO's Nightmare - Israel Baron on Railway Security ]]> 2022-08-15T18:46:08+00:00 https://www.cybereason.com/blog/malicious-life-podcast-a-cisos-nightmare-israel-baron-on-railway-security www.secnews.physaphae.fr/article.php?IdArticle=6344540 False None None None CybeReason - Vendor blog Webinar August 25th 2022: Leveraging MITRE ATT&CK to Bolster Your Security Webinar August 25th 2022: Leveraging MITRE ATT&CK to Bolster Your Security The MITRE ATT&CK Framework is one of the most powerful resources security practitioners can use to develop robust defenses against adversaries. This webinar is designed to show you how you can take the framework and build more powerful defenses without requiring decades of cybersecurity experience.]]> 2022-08-15T17:06:19+00:00 https://www.cybereason.com/blog/webinar-august-25th-2022-leveraging-mitre-attck-to-bolster-your-security www.secnews.physaphae.fr/article.php?IdArticle=6343583 True None None None CybeReason - Vendor blog Introducing Cybereason MDR Mobile App: The Power of the SOC at Your Fingertips Introducing Cybereason MDR Mobile App: The Power of the SOC at Your Fingertips ]]> 2022-08-10T10:00:00+00:00 https://www.cybereason.com/blog/introducing-cybereason-mdr-mobile-app-the-power-of-the-soc-at-your-fingertips www.secnews.physaphae.fr/article.php?IdArticle=6228815 False None None None CybeReason - Vendor blog Rundll32: The Infamous Proxy for Executing Malicious Code Rundll32: The Infamous Proxy for Executing Malicious Code ]]> 2022-08-09T10:00:00+00:00 https://www.cybereason.com/blog/rundll32-the-infamous-proxy-for-executing-malicious-code www.secnews.physaphae.fr/article.php?IdArticle=6210321 False None None None CybeReason - Vendor blog Malicious Life Podcast: Operation Trojan Shield - Designed by Criminals for Criminals Malicious Life Podcast: Operation Trojan Shield - Designed by Criminals for Criminals ]]> 2022-08-08T15:45:46+00:00 https://www.cybereason.com/blog/malicious-life-podcast-operation-trojan-shield-designed-by-criminals-for-criminals www.secnews.physaphae.fr/article.php?IdArticle=6203761 False None None None CybeReason - Vendor blog Four Reasons to Implement an XDR Solution Today Four Reasons to Implement an XDR Solution Today ]]> 2022-08-03T13:49:26+00:00 https://www.cybereason.com/blog/four-reasons-to-implement-an-xdr-solution-today www.secnews.physaphae.fr/article.php?IdArticle=6107322 False None None None CybeReason - Vendor blog Defending the Retail Sector Against Ransomware Attacks Defending the Retail Sector Against Ransomware Attacks Nearly half of all retailers fell victim to a ransomware attack in 2021. Sadly, 54% reported having their data encrypted and 58% reported having to resort to layoffs after suffering the attack. ]]> 2022-08-02T14:05:28+00:00 https://www.cybereason.com/blog/defending-the-retail-sector-against-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=6091662 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Andrew Ginter - A 40-Year-Old Backdoor Malicious Life Podcast: Andrew Ginter - A 40-Year-Old Backdoor ]]> 2022-08-01T15:12:11+00:00 https://www.cybereason.com/blog/malicious-life-podcast-andrew-ginter-a-40-year-old-backdoor www.secnews.physaphae.fr/article.php?IdArticle=6080149 False None None None CybeReason - Vendor blog Webinar August 11th 2022: Ransomware Labs Webinar August 11th 2022: Ransomware Labs ]]> 2022-07-27T18:08:45+00:00 https://www.cybereason.com/blog/webinar-august-11th-2022-ransomware-labs www.secnews.physaphae.fr/article.php?IdArticle=5975085 False Ransomware None None CybeReason - Vendor blog Five of the Most Advanced RansomOps Gangs Five of the Most Advanced RansomOps Gangs ]]> 2022-07-27T14:26:48+00:00 https://www.cybereason.com/blog/five-of-the-most-advanced-ransomops-gangs www.secnews.physaphae.fr/article.php?IdArticle=5971598 False None None None CybeReason - Vendor blog How XDR Can Play a Key Role in Achieving Zero Trust How XDR Can Play a Key Role in Achieving Zero Trust ]]> 2022-07-26T13:46:18+00:00 https://www.cybereason.com/blog/how-xdr-can-play-a-key-role-in-achieving-zero-trust www.secnews.physaphae.fr/article.php?IdArticle=5950980 False None None None CybeReason - Vendor blog Five Steps to Improve Defenses with MITRE ATT&CK Five Steps to Improve Defenses with MITRE ATT&CK MITRE Adversarial Tactics, Techniques and Common Knowledge (MITRE ATT&CK) is a model and knowledge base of adversary behavior. Designed to look at attacks from the attacker's perspective, it catalogs the attack lifecycle of different adversaries and the platforms they choose to target, all based on real-world observations. ]]> 2022-07-25T15:02:52+00:00 https://www.cybereason.com/blog/five-steps-to-improve-defenses-with-mitre-attck www.secnews.physaphae.fr/article.php?IdArticle=5940834 False None None None CybeReason - Vendor blog Malicious Life Podcast: Silk Road - The Amazon of Drugs Part 2 Malicious Life Podcast: Silk Road - The Amazon of Drugs Part 2 ]]> 2022-07-25T12:00:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-silk-road-the-amazon-of-drugs-part-2 www.secnews.physaphae.fr/article.php?IdArticle=5940835 True None None None CybeReason - Vendor blog Ransomware Attacks by the Numbers - and How to Defend Against Them Ransomware Attacks by the Numbers - and How to Defend Against Them Ransomware is an ever-evolving type of malware that has been around for more than two decades. First appearing in the late 1980s and growing in popularity and complexity in the early 2010s, Ransomware has risen to an unprecedented level with multi-million dollar ransom demands in attacks against companies like Colonial Pipeline, JBS Foods and other critical infrastructure providers. ]]> 2022-07-20T13:49:40+00:00 https://www.cybereason.com/blog/ransomware-attacks-by-the-numbers-and-how-to-defend-against-them www.secnews.physaphae.fr/article.php?IdArticle=5833467 False Ransomware,Malware None None