www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:20:29+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog Cybereason and TruVisor Partner to Protect ASEAN Enterprises from Advanced Cyber Threats Cybereason and TruVisor Partner to Protect ASEAN Enterprises from Advanced Cyber Threats ]]> 2022-07-20T11:00:00+00:00 https://www.cybereason.com/blog/cybereason-and-truvisor-partner-to-protect-asean-enterprises-from-advanced-cyber-threats www.secnews.physaphae.fr/article.php?IdArticle=5835282 False None None None CybeReason - Vendor blog Achieving High-Fidelity Detections with XDR Achieving High-Fidelity Detections with XDR ]]> 2022-07-19T14:09:53+00:00 https://www.cybereason.com/blog/achieving-high-fidelity-detections-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=5826699 False None None None CybeReason - Vendor blog Malicious Life Podcast: Kurtis Minder - Ransomware Negotiations Malicious Life Podcast: Kurtis Minder - Ransomware Negotiations ]]> 2022-07-18T14:45:26+00:00 https://www.cybereason.com/blog/malicious-life-podcast-kurtis-minder-ransomware-negotiations www.secnews.physaphae.fr/article.php?IdArticle=5818049 False Ransomware None None CybeReason - Vendor blog Protecting Your Org from Collateral Damage Through Operational Resilience Protecting Your Org from Collateral Damage Through Operational Resilience Amongst business leaders, the term operational resilience shouldn't be new, yet for many security leaders it is. It was Dwight D. Eisenhower who said, “In preparing for battle, I have always found that plans are useless, but planning is indispensable...” ie: it's hard to plan when you don't know what the opponent's plans are, but you can prepare for different scenarios. ]]> 2022-07-14T12:53:27+00:00 https://www.cybereason.com/blog/protecting-your-org-from-collateral-damage-through-operational-resilience www.secnews.physaphae.fr/article.php?IdArticle=5719515 False Guideline None None CybeReason - Vendor blog How an Integrated Approach is Key for Security Operations How an Integrated Approach is Key for Security Operations Dwell time has a lot to do with the overall cost of a data breach these days. For example, the Cost of a Data Breach Study 2021 revealed that average data breach costs had risen from $3.86 million to $4.24 million-the highest amount in the report's history. ]]> 2022-07-13T12:18:03+00:00 https://www.cybereason.com/blog/how-an-integrated-approach-is-key-for-security-operations www.secnews.physaphae.fr/article.php?IdArticle=5692993 False Data Breach None None CybeReason - Vendor blog Malicious Life Podcast: Silk Road - The Amazon of Drugs Part 1 Malicious Life Podcast: Silk Road - The Amazon of Drugs Part 1 ]]> 2022-07-12T13:12:34+00:00 https://www.cybereason.com/blog/malicious-life-podcast-silk-road-the-amazon-of-drugs-part-1 www.secnews.physaphae.fr/article.php?IdArticle=5670647 False None None None CybeReason - Vendor blog RansomOps: Not Your Parent\'s Ransomware RansomOps: Not Your Parent's Ransomware It's no secret that in recent years ransomware gangs have upped their game. There were over 300 million attacks in the first half of 2021 alone, according to one report, a 151% increase year-over-year. And payment demands have gone up–last year the average ransom payment was around $570,000, although we did see CNA Financial fork out an unprecedented $40 million to Evil Corp  and one gang asking an audacious $50 million.]]> 2022-07-12T11:58:29+00:00 https://www.cybereason.com/blog/ransomops-not-your-parents-ransomware www.secnews.physaphae.fr/article.php?IdArticle=5669241 False Ransomware None None CybeReason - Vendor blog Webinar July 28th 2022: Ransomware Impact on Incident Response Strategies Webinar July 28th 2022: Ransomware Impact on Incident Response Strategies ]]> 2022-07-08T17:20:15+00:00 https://www.cybereason.com/blog/webinar-july-28th-2022-ransomware-impact-on-incident-response-strategies www.secnews.physaphae.fr/article.php?IdArticle=5615646 False Ransomware None None CybeReason - Vendor blog Everything Cybereason at the Black Hat 2022 Conference! Everything Cybereason at the Black Hat 2022 Conference! ]]> 2022-07-07T20:35:57+00:00 https://www.cybereason.com/blog/everything-cybereason-at-the-black-hat-2022-conference www.secnews.physaphae.fr/article.php?IdArticle=5599371 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: LockBit 2.0 - All Paths Lead to Ransom THREAT ANALYSIS REPORT: LockBit 2.0 - All Paths Lead to Ransom ]]> 2022-07-07T14:20:18+00:00 https://www.cybereason.com/blog/threat-analysis-report-lockbit-2.0-all-paths-lead-to-ransom www.secnews.physaphae.fr/article.php?IdArticle=5595489 False Guideline None None CybeReason - Vendor blog THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices THREAT ALERT: Raspberry Robin Worm Abuses Windows Installer and QNAP Devices The Cybereason Global Security Operations Center (SOC) Team issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them.]]> 2022-07-07T14:02:10+00:00 https://www.cybereason.com/blog/threat-alert-raspberry-robin-worm-abuses-windows-installer-and-qnap-devices www.secnews.physaphae.fr/article.php?IdArticle=5595490 True Threat None None CybeReason - Vendor blog What\'s New with Ransomware Gangs? What's New with Ransomware Gangs? The looming threat of new ransomware models was the top concern of executives in the fall of 2021, reported Gartner. Less than a year later, organizations find themselves facing an escalation of that very threat. ]]> 2022-07-07T13:25:56+00:00 https://www.cybereason.com/blog/whats-new-with-ransomware-gangs www.secnews.physaphae.fr/article.php?IdArticle=5595491 False Ransomware,Threat None None CybeReason - Vendor blog Webinar July 21st 2022: Leveraging MITRE ATT&CK to Bolster Your Security Posture Webinar July 21st 2022: Leveraging MITRE ATT&CK to Bolster Your Security Posture The MITRE ATT&CK Framework is one of the most powerful resources security practitioners can use to develop robust defenses against adversaries. This webinar is designed to show you how you can take the framework and build more powerful defenses without requiring decades of cybersecurity experience.]]> 2022-07-07T12:00:00+00:00 https://www.cybereason.com/blog/webinar-july-21st-2022-leveraging-mitre-attck-to-bolster-your-security-posture www.secnews.physaphae.fr/article.php?IdArticle=5595492 False None None None CybeReason - Vendor blog Malicious Life Wins Best Security Vendor Podcast Malicious Life Wins Best Security Vendor Podcast Cybereason is thrilled to announce that Malicious Life won Best Security Vendor Podcast at the 2022 European Security Bloggers Network Awards. Hosted by Eskenzi PR & Marketing on the first night of Infosecurity Europe, the European Security Bloggers Network Awards is a celebration of veteran as well as up-and-coming bloggers, vloggers, podcasters, and other social media personalities in the cybersecurity industry.]]> 2022-07-06T21:05:34+00:00 https://www.cybereason.com/blog/malicious-life-wins-best-security-vendor-podcast www.secnews.physaphae.fr/article.php?IdArticle=5584866 False None None None CybeReason - Vendor blog Accelerate Investigations with the New Cybereason Process Timeline Feature Accelerate Investigations with the New Cybereason Process Timeline Feature ]]> 2022-07-06T13:48:12+00:00 https://www.cybereason.com/blog/accelerate-investigations-with-the-new-cybereason-process-timeline-feature www.secnews.physaphae.fr/article.php?IdArticle=5579528 False None None None CybeReason - Vendor blog Malicious Life Podcast: Jacob Goldstein on the Future Of BitCoin Malicious Life Podcast: Jacob Goldstein on the Future Of BitCoin ]]> 2022-07-05T15:02:25+00:00 https://www.cybereason.com/blog/malicious-life-podcast-jacob-goldstein-on-the-future-of-bitcoin www.secnews.physaphae.fr/article.php?IdArticle=5565159 False None None None CybeReason - Vendor blog Security Telemetry Evolution: The Year of the In-Memory Graph? Security Telemetry Evolution: The Year of the In-Memory Graph? A fad or trend is any form of collective behavior that develops within a culture, a generation or social group in which a group of people enthusiastically follow an impulse for a short period. In cyber, every year there is at least one new fad with associated buzz words–but what's different is that, unlike many fads, we don't discard one and move onto the next, we tend to incrementally layer them. ]]> 2022-06-30T13:02:01+00:00 https://www.cybereason.com/blog/security-telemetry-evolution-the-year-of-the-in-memory-graph www.secnews.physaphae.fr/article.php?IdArticle=5471780 False None None None CybeReason - Vendor blog Not All XDR is Created Equal Not All XDR is Created Equal The global Extended Detection and Response (XDR) market is expected to grow considerably over the next decade. World Wide Technology reported that it will grow at a compound annual growth rate of nearly 20% between 2021 to 2028, reaching a value of $2.06 billion by that time. ]]> 2022-06-29T12:51:45+00:00 https://www.cybereason.com/blog/not-all-xdr-is-created-equal www.secnews.physaphae.fr/article.php?IdArticle=5452796 False None None None CybeReason - Vendor blog What are the Legal Implications from a Ransomware Attack? What are the Legal Implications from a Ransomware Attack? Picture the scene: you are the chief counsel at a large, multinational corporation, and as you attempt to log on to your system on Monday morning, you notice that your email box isn't updating, and you can't log on to your computer using the company VPN. You then discover that others in the organization are having similar issues.Soon after, you receive a frantic call from the company CSO who explains that the organization has been hit by ransomware and the attackers sent a ransom note demanding a huge payment within three days–and if payment is not received, all of the organization's private data will be published online and made accessible to anyone. Ransomware attacks are targeting every industry globally, including highly regulated industries such as government and healthcare. Since the onset of the COVID-19 pandemic, the number of ransomware attacks has drastically increased. Security Magazine reports a 72 percent increase in the number of ransomware attacks since the beginning of the pandemic. Evidence suggests that having employees working remotely significantly increases the risk of a successful ransomware attack.]]> 2022-06-28T12:57:34+00:00 https://www.cybereason.com/blog/what-are-the-legal-implications-from-a-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=5432181 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Cypherpunks Who Invented Private Digital Money Malicious Life Podcast: The Cypherpunks Who Invented Private Digital Money ]]> 2022-06-27T16:03:31+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-cypherpunks-who-invented-private-digital-money www.secnews.physaphae.fr/article.php?IdArticle=5420361 False None None None CybeReason - Vendor blog Webinar July 14th 2022: Ransomware Labs Webinar July 14th 2022: Ransomware Labs ]]> 2022-06-27T14:48:24+00:00 https://www.cybereason.com/blog/webinar-july-14th-2022-ransomware-labs www.secnews.physaphae.fr/article.php?IdArticle=5420362 False Ransomware None None CybeReason - Vendor blog Cybereason vs. Black Basta Ransomware Cybereason vs. Black Basta Ransomware ]]> 2022-06-24T11:00:00+00:00 https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware www.secnews.physaphae.fr/article.php?IdArticle=5359523 False Ransomware None None CybeReason - Vendor blog THREAT ALERT: Follina/MSDT Microsoft Office Vulnerability THREAT ALERT: Follina/MSDT Microsoft Office Vulnerability ]]> 2022-06-22T13:04:57+00:00 https://www.cybereason.com/blog/threat-alert-follina/msdt-microsoft-office-vulnerability www.secnews.physaphae.fr/article.php?IdArticle=5326865 False Vulnerability None None CybeReason - Vendor blog Malicious Life Podcast: Celebrating Five Years of Malicious Life Malicious Life Podcast: Celebrating Five Years of Malicious Life ]]> 2022-06-21T14:35:44+00:00 https://www.cybereason.com/blog/malicious-life-podcast-celebrating-five-years-of-malicious-life www.secnews.physaphae.fr/article.php?IdArticle=5310884 False None None None CybeReason - Vendor blog Cybereason CEO Lior Div Named 2022 EY \'Entrepreneur of the Year\' for New England Cybereason CEO Lior Div Named 2022 EY 'Entrepreneur of the Year' for New England Cybereason CEO and Co-founder Lior Div has been honored as the Ernst & Young Entrepreneur Of The Year® 2022 New England Award winner. The Ernst & Young (EY) Entrepreneur of the Year Awards celebrate entrepreneurs from the Maine, Massachusetts, New Hampshire, Rhode Island, and Vermont regions, and is one of the preeminent competitive business awards for entrepreneurs and leaders of high-growth companies who think big to succeed.]]> 2022-06-21T09:00:00+00:00 https://www.cybereason.com/blog/cybereason-ceo-lior-div-named-2022-ey-entrepreneur-of-the-year-for-new-england www.secnews.physaphae.fr/article.php?IdArticle=5312388 False Guideline None None CybeReason - Vendor blog Malicious Life Podcast: Hackers vs. Spies - The Stratfor Leaks Part 2 Malicious Life Podcast: Hackers vs. Spies - The Stratfor Leaks Part 2 ]]> 2022-06-17T17:56:22+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hackers-vs.-spies-the-stratfor-leaks-part-2 www.secnews.physaphae.fr/article.php?IdArticle=5225645 True None None None CybeReason - Vendor blog How AI-Driven XDR Defeats Ransomware How AI-Driven XDR Defeats Ransomware ]]> 2022-06-15T15:46:03+00:00 https://www.cybereason.com/blog/how-ai-driven-xdr-defeats-ransomware www.secnews.physaphae.fr/article.php?IdArticle=5168336 False Ransomware None None CybeReason - Vendor blog Defending Against the Five Stages of a Ransomware Attack Defending Against the Five Stages of a Ransomware Attack The increasing sophistication of ransomware attacks is costing businesses more than ever. Our recently released report, titled Ransomware: The True Cost to Business Study 2022, revealed that 73% of organizations suffered at least one ransomware attack in 2022, compared with just 55% in the 2021 study. ]]> 2022-06-14T16:41:26+00:00 https://www.cybereason.com/blog/defending-against-the-five-stages-of-a-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=5148676 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Hackers vs. Spies - The Stratfor Leaks Part 1 Malicious Life Podcast: Hackers vs. Spies - The Stratfor Leaks Part 1 ]]> 2022-06-13T15:22:06+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hackers-vs.-spies-the-stratfor-leaks-part-1 www.secnews.physaphae.fr/article.php?IdArticle=5133971 False None None None CybeReason - Vendor blog Report: Ransomware Attacks and the True Cost to Business 2022 Report: Ransomware Attacks and the True Cost to Business 2022 Ransomware continues to dominate the threat landscape in 2022. Organizations are under siege from a wide variety of threats, but ransomware offers threat actors a unique combination of very low risk with very high reward-which is why the volume of ransomware attacks nearly doubled from the previous year, and the total cost of ransomware was estimated to exceed $20 billion.]]> 2022-06-07T10:00:00+00:00 https://www.cybereason.com/blog/report-ransomware-attacks-and-the-true-cost-to-business-2022 www.secnews.physaphae.fr/article.php?IdArticle=5020824 False Ransomware,Threat None None CybeReason - Vendor blog Webinar June 30th 2022: Live Attack Simulation - Ransomware Threat Hunter Series Webinar June 30th 2022: Live Attack Simulation - Ransomware Threat Hunter Series ]]> 2022-06-03T13:10:32+00:00 https://www.cybereason.com/blog/webinar-june-30th-2022-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4952687 True Ransomware,Threat None None CybeReason - Vendor blog Latest SOC Survey Anticipates Shift Toward MDR and XDR Latest SOC Survey Anticipates Shift Toward MDR and XDR The challenges faced by Security Operations Centers (SOCs) around the world-workforce shortages, lack of visibility and automation, tool sprawl, and alert overload-continue to have a negative impact on SOC effectiveness and will likely result in increasing adoption of Managed Detection and Response (MDR) services and Extended Detection and Response (XDR) solutions.]]> 2022-06-02T16:35:43+00:00 https://www.cybereason.com/blog/latest-soc-survey-anticipates-shift-toward-mdr-and-xdr www.secnews.physaphae.fr/article.php?IdArticle=4935734 False Tool None None CybeReason - Vendor blog How to Choose the Right Endpoint Sensor How to Choose the Right Endpoint Sensor Sensors are the workhorse of Endpoint Detection and Response (EDR) solutions. An endpoint sensor is a lightweight software component on devices that collects data and provides a firsthand account of what is taking place on the endpoint. ]]> 2022-06-01T14:07:06+00:00 https://www.cybereason.com/blog/choose-the-right-endpoint-sensor www.secnews.physaphae.fr/article.php?IdArticle=4919873 False None None None CybeReason - Vendor blog Spear Phishing: A Technical Case Study for XDR Spear Phishing: A Technical Case Study for XDR ]]> 2022-06-01T13:49:35+00:00 https://www.cybereason.com/blog/spear-phishing-a-technical-case-study-for-xdr www.secnews.physaphae.fr/article.php?IdArticle=4919874 False None None None CybeReason - Vendor blog Malicious Life Podcast: Catching A Cybercriminal Malicious Life Podcast: Catching A Cybercriminal ]]> 2022-05-31T12:27:03+00:00 https://www.cybereason.com/blog/malicious-life-podcast-catching-a-cybercriminal www.secnews.physaphae.fr/article.php?IdArticle=4905473 False None None None CybeReason - Vendor blog Webinar June 23rd 2022: Live Attack Simulation - XDR vs. Modern Ransomware Webinar June 23rd 2022: Live Attack Simulation - XDR vs. Modern Ransomware ]]> 2022-05-31T12:00:00+00:00 https://www.cybereason.com/blog/webinar-june-23rd-live-attack-simulation-xdr-vs.-modern-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4905474 False Ransomware None None CybeReason - Vendor blog Improving SOC Workflows with Cybereason Role-Based Incident Response Improving SOC Workflows with Cybereason Role-Based Incident Response Security Operations Centers (SOCs) are the first line of defense for businesses when responding to cyber attacks. But with SOC teams struggling to find skilled resources coupled with the increasing volume and sophistication of attacks, Defenders must have a well-defined incident response workflow. ]]> 2022-05-27T13:11:26+00:00 https://www.cybereason.com/blog/improving-soc-workflows-with-cybereason-role-based-incident-response www.secnews.physaphae.fr/article.php?IdArticle=4840125 False None None None CybeReason - Vendor blog Defend Forward in the Private Sector Defend Forward in the Private Sector ]]> 2022-05-26T15:22:06+00:00 https://www.cybereason.com/blog/defend-forward-in-the-private-sector www.secnews.physaphae.fr/article.php?IdArticle=4822650 False None None None CybeReason - Vendor blog Cybereason Taps Osamu Yamano as President of Japanese Operations Cybereason Taps Osamu Yamano as President of Japanese Operations ]]> 2022-05-26T13:00:00+00:00 https://www.cybereason.com/blog/cybereason-taps-osamu-yamano-as-president-of-japanese-operations www.secnews.physaphae.fr/article.php?IdArticle=4822651 False None None None CybeReason - Vendor blog Securing Your Organization\'s Digital Transformation with XDR Securing Your Organization's Digital Transformation with XDR As we all know, the pandemic accelerated many organizations' digital transformation initiatives. According to Help Net Security, many enterprises accelerated their journeys by as many as 3-5 years by building new IT systems to support remote work as well as to keep up with supply and demand. This pace isn't expected to slow down over the years course of 2022. ]]> 2022-05-25T13:08:21+00:00 https://www.cybereason.com/blog/securing-your-organizations-digital-transformation-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=4803868 False None None None CybeReason - Vendor blog Cybereason Improves Investigation, Enhances Protection and Infrastructure Management Cybereason Improves Investigation, Enhances Protection and Infrastructure Management Cybereason is constantly innovating to ensure that our customers can achieve the utmost efficacy and efficiency in their security programs. The latest release of the Cybereason Defense Platform is packed with enhancements, including improvements to query results, sensor management, updated workflows, and expanded support for Linux. Customers can read the complete release notes on The Nest.]]> 2022-05-25T12:58:27+00:00 https://www.cybereason.com/blog/cybereason-improves-investigation-enhances-protection-and-infrastructure-management www.secnews.physaphae.fr/article.php?IdArticle=4803869 False None None None CybeReason - Vendor blog Malicious Life Podcast: What The LinkedIn Hack Taught Us About Storing Passwords Malicious Life Podcast: What The LinkedIn Hack Taught Us About Storing Passwords ]]> 2022-05-24T15:00:49+00:00 https://www.cybereason.com/blog/malicious-life-podcast-what-the-linkedin-hack-taught-us-about-storing-passwords www.secnews.physaphae.fr/article.php?IdArticle=4787705 False Hack None None CybeReason - Vendor blog Targeted by Ransomware? Here are Three Things to Do Straight Away Targeted by Ransomware? Here are Three Things to Do Straight Away Ransomware attacks more than doubled over the course of 2021. In a report shared by PRNewswire, researchers revealed that they had detected 623.3 million attacks globally-318.6 million more attacks than were observed in 2020-an increase of 105%. Looking back even further, ransomware attack volumes grew 232% between 2019 and 2021.]]> 2022-05-24T14:22:05+00:00 https://www.cybereason.com/blog/targeted-by-ransomware-here-are-three-things-to-do-straight-away www.secnews.physaphae.fr/article.php?IdArticle=4786281 False Ransomware None None CybeReason - Vendor blog Defend Forward Defend Forward ]]> 2022-05-23T12:12:52+00:00 https://www.cybereason.com/blog/defend-forward www.secnews.physaphae.fr/article.php?IdArticle=4774888 False None None None CybeReason - Vendor blog Ransomware: What\'s in a Name? Ransomware: What's in a Name? ]]> 2022-05-18T12:53:20+00:00 https://www.cybereason.com/blog/ransomware-whats-in-a-name www.secnews.physaphae.fr/article.php?IdArticle=4689213 False None None None CybeReason - Vendor blog Cyber Defenders Council Report: Defend Forward - A Proactive Model for Cyber Deterrence Cyber Defenders Council Report: Defend Forward - A Proactive Model for Cyber Deterrence The Defend Forward concept emerged from the US Department of Defense 2018 National Cyber Strategy. Senior Defense Department leaders had grown increasingly concerned about the sophisticated ways in which certain nation-states were bringing together economic coercion, political influence, information operations, cyber operations, and conventional and unconventional military operations to advance their national interests. ]]> 2022-05-17T12:00:00+00:00 https://www.cybereason.com/blog/cyber-defenders-council-report-defend-forward-a-proactive-model-for-cyber-deterrence www.secnews.physaphae.fr/article.php?IdArticle=4666713 False Guideline None None CybeReason - Vendor blog Malicious Life Podcast: Inside Operation CuckooBees Malicious Life Podcast: Inside Operation CuckooBees ]]> 2022-05-17T08:30:00+00:00 https://www.cybereason.com/blog/malicious-life-podcast-inside-operation-cuckoobees www.secnews.physaphae.fr/article.php?IdArticle=4671515 False None None None CybeReason - Vendor blog Cybereason Named to CNBC 2022 Disruptor 50 List for Second Consecutive Year Cybereason Named to CNBC 2022 Disruptor 50 List for Second Consecutive Year Cybereason has been named to the exclusive 10th Annual CNBC Disruptor 50 list of the most disruptive private global companies, joining other esteemed rapid-growth companies including Canva, Blockchain.com, Stripe, Chime and more. ]]> 2022-05-17T08:00:00+00:00 https://www.cybereason.com/blog/cybereason-named-to-cnbc-2022-disruptor-50-list-for-second-consecutive-year www.secnews.physaphae.fr/article.php?IdArticle=4671516 False None None None CybeReason - Vendor blog Cybereason Named Overall Leader in 2022 KuppingerCole Leadership Compass Cybereason Named Overall Leader in 2022 KuppingerCole Leadership Compass ]]> 2022-05-16T18:28:08+00:00 https://www.cybereason.com/blog/cybereason-named-overall-leader-in-2022-kuppingercole-leadership-compass www.secnews.physaphae.fr/article.php?IdArticle=4660333 True Guideline None None CybeReason - Vendor blog Achieve Faster, More Accurate Response with Cybereason Threat Intelligence Achieve Faster, More Accurate Response with Cybereason Threat Intelligence ]]> 2022-05-16T17:03:08+00:00 https://www.cybereason.com/blog/achieve-faster-more-accurate-response-with-cybereason-threat-intelligence www.secnews.physaphae.fr/article.php?IdArticle=4659375 False Threat None None CybeReason - Vendor blog Webinar June 2nd 2022: Live Attack Simulation - Ransomware Threat Hunter Series Webinar June 2nd 2022: Live Attack Simulation - Ransomware Threat Hunter Series ]]> 2022-05-16T13:26:55+00:00 https://www.cybereason.com/blog/webinar-june-2nd-2022-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4657307 True Ransomware,Threat None None CybeReason - Vendor blog Behavioral Execution Prevention: Next-Generation Antivirus Evolved Behavioral Execution Prevention: Next-Generation Antivirus Evolved Defenders around the world need innovative tools to stop sophisticated attacks. Cybereason is excited to announce Behavioral Execution Prevention (BEP), a new layer of NGAV defense designed to stop phishing attacks, zero-day attacks, and drive-by attacks. ]]> 2022-05-13T13:00:22+00:00 https://www.cybereason.com/blog/behavioral-execution-prevention-next-generation-antivirus-evolved www.secnews.physaphae.fr/article.php?IdArticle=4591106 False None None None CybeReason - Vendor blog Russia Is Waging Cyberwar–with Little Success Russia Is Waging Cyberwar–with Little Success The atrocities taking place in Ukraine are truly tragic. It is personal to me. I've had the opportunity to work alongside cyber experts in Ukraine–providing time and resources over the years to help with cyber deterrence, and I watched anxiously as tensions escalated earlier this year. Russia may have launched its physical invasion of its neighbor on February 24, but Russia and threat actors aligned with Russia have been targeting Ukraine with cyberattacks for years. ]]> 2022-05-12T15:54:00+00:00 https://www.cybereason.com/blog/russia-is-waging-cyberwar-with-little-success www.secnews.physaphae.fr/article.php?IdArticle=4584870 False Threat None 4.0000000000000000 CybeReason - Vendor blog Employee Spotlight: Why People are Key to Cybereason Success Employee Spotlight: Why People are Key to Cybereason Success Tim Weis, who was recently promoted to Senior Talent Acquisition Partner, supports hiring for some of our US-based teams and helps each of them scale and grow. Read below to learn more about Tim and why he says this is an exciting time to join Cybereason.]]> 2022-05-12T13:00:56+00:00 https://www.cybereason.com/blog/employee-spotlight-why-people-are-key-to-cybereason-success www.secnews.physaphae.fr/article.php?IdArticle=4584166 False None None 3.0000000000000000 CybeReason - Vendor blog Harnessing the Power of AI-Driven XDR Harnessing the Power of AI-Driven XDR Many security professionals believe they're going to start seeing an uptick in AI-assisted attacks at some point in the near future. According to AIMultiple, 90% of infosec personnel in the U.S. and Japan said they're anticipating an increase in these automated attack campaigns, due in no small part to the public availability of AI research, which attackers are exploiting for their malicious purposes.]]> 2022-05-11T12:59:06+00:00 https://www.cybereason.com/blog/harnessing-the-power-of-ai-driven-xdr www.secnews.physaphae.fr/article.php?IdArticle=4577775 False None None 2.0000000000000000 CybeReason - Vendor blog New Cybereason Incident Response and Professional Services Bundles Include Unlimited Support New Cybereason Incident Response and Professional Services Bundles Include Unlimited Support Cybereason has launched subscription-based bundles for Incident Response (IR) and Professional Services teams that deliver the speed and agility needed to identify, correlate, and quickly contain threats while reducing costs by as much as thirty percent.]]> 2022-05-10T12:25:56+00:00 https://www.cybereason.com/blog/new-cybereason-incident-response-and-professional-services-bundles-include-unlimited-support www.secnews.physaphae.fr/article.php?IdArticle=4572608 False None None 4.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: How to Russia-Proof Your Democracy Malicious Life Podcast: How to Russia-Proof Your Democracy In 2007, Estonia–then already a technologically advanced country–suffered a large-scale DDoS attack which crippled many organizations and digital services. Joseph Carson, a Security Scientist and adviser to several governments discusses the lessons learned from that event and how Estonia became what he calls 'A Cloud Country' - check it out…]]> 2022-05-09T13:21:56+00:00 https://www.cybereason.com/blog/malicious-life-podcast-how-to-russia-proof-your-democracy www.secnews.physaphae.fr/article.php?IdArticle=4567954 False None None 2.0000000000000000 CybeReason - Vendor blog How Do Ransomware Attacks Impact Victim Organizations\' Stock? How Do Ransomware Attacks Impact Victim Organizations' Stock? Ransomware has developed into an extremely lucrative business model with little risk involved for the threat actors. Couple this with the willingness of most victim organizations to pay the ransom demand under the assumption it will return business operations to normal–ultimately encouraging more attacks–and we have a big problem with no easy remedies. ]]> 2022-05-09T12:40:12+00:00 https://www.cybereason.com/blog/how-do-ransomware-attacks-impact-victim-organizations-stock www.secnews.physaphae.fr/article.php?IdArticle=4567955 False Ransomware,Threat None 3.0000000000000000 CybeReason - Vendor blog The Global Impact of Operation CuckooBees The Global Impact of Operation CuckooBees Nation-states hack each other. This is the reality we live in and have for some time. The difference is some attacks are more dangerous than others, with a global impact. I'm proud of the research the Cybereason team has unveiled this week on Operation CuckooBees. This research is different. This campaign goes beyond nation-state espionage and has a ripple effect with consequences that impact the global economy.  ]]> 2022-05-06T14:24:54+00:00 https://www.cybereason.com/blog/the-global-impact-of-operation-cuckoobees www.secnews.physaphae.fr/article.php?IdArticle=4555891 False Hack None 4.0000000000000000 CybeReason - Vendor blog How the MalOp Can Facilitate New Breach Reporting Rules How the MalOp Can Facilitate New Breach Reporting Rules New rules went into effect May 1 that require U.S. financial institutions to report cyber security incidents to regulators within 36 hours. ]]> 2022-05-05T13:53:04+00:00 https://www.cybereason.com/blog/how-the-malop-can-facilitate-new-breach-reporting-rules www.secnews.physaphae.fr/article.php?IdArticle=4548915 False None None None CybeReason - Vendor blog Webinar May 25th 2022: Organizations at Risk: Ransomware Attackers Don\'t Take Holidays Webinar May 25th 2022: Organizations at Risk: Ransomware Attackers Don't Take Holidays Join us for this webinar as we delve into research findings about the risk to organizations from ransomware attacks that occur on weekends and holidays and how you can better prepare to defend against and respond to attacks designed to hit when your organization is most vulnerable.]]> 2022-05-05T13:47:10+00:00 https://www.cybereason.com/blog/webinar-may-25th-organizations-at-risk-ransomware-attackers-dont-take-holidays www.secnews.physaphae.fr/article.php?IdArticle=4548916 False Ransomware None None CybeReason - Vendor blog Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Cybersecurity often focuses on malware campaigns or the latest zero-day exploit. Surveys and reports reveal the average cost of a data breach or how much it typically costs to recover from a ransomware attack. Those are the attacks that make noise and capture attention, though. The attacks that fly under the radar are often more insidious and much more costly. ]]> 2022-05-04T04:02:00+00:00 https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation www.secnews.physaphae.fr/article.php?IdArticle=4541154 False Ransomware,Data Breach,Malware None None CybeReason - Vendor blog Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques In 2021, the Cybereason Nocturnus Incident Response Team investigated multiple intrusions targeting technology and manufacturing companies located in Asia, Europe and North America. Based on the findings of our investigation, it appears that the goal behind these intrusions was to steal sensitive intellectual property for cyber espionage purposes. ]]> 2022-05-04T04:01:00+00:00 https://www.cybereason.com/blog/operation-cuckoobees-deep-dive-into-stealthy-winnti-techniques www.secnews.physaphae.fr/article.php?IdArticle=4541155 False None APT 41 None CybeReason - Vendor blog Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive Operation CuckooBees: A Winnti Malware Arsenal Deep-Dive In part one of this research, the Cybereason Nocturnus Incident Response Team provided a unique glimpse into the Wintti intrusion playbook, covering the techniques that were used by the group from initial compromise to stealing the data, as observed and analyzed by the Cybereason Incident Response team. ]]> 2022-05-04T04:00:00+00:00 https://www.cybereason.com/blog/operation-cuckoobees-a-winnti-malware-arsenal-deep-dive www.secnews.physaphae.fr/article.php?IdArticle=4541156 False Malware APT 41 None CybeReason - Vendor blog Webinar May 19th 2022: Live Attack Simulation - XDR vs. Modern Ransomware Webinar May 19th 2022: Live Attack Simulation - XDR vs. Modern Ransomware Throughout history, sometimes truth ends up being even stranger than fiction. Today's parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. Attackers are operationalizing exploits at a record rate, targeting more organizations and are operating to reduce dwell time.]]> 2022-05-03T13:28:07+00:00 https://www.cybereason.com/blog/webinar-may-19th-live-attack-simulation-xdr-vs.-modern-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4538072 True Ransomware None None CybeReason - Vendor blog The U.K. Cyber Strategy: Developing Cybersecurity Skills, Knowledge and Culture The U.K. Cyber Strategy: Developing Cybersecurity Skills, Knowledge and Culture In the final installment of our five-part blog series on the U.K. Government Cybersecurity Strategy for 2022-2030, we spoke with Greg Day, Cybereason's Vice President and Global Field Chief Information Security Officer (CISO) for the EMEA region, to get his perspective on the strategy's final objective: Developing the right cybersecurity skills, knowledge, and culture. ]]> 2022-05-03T13:13:09+00:00 https://www.cybereason.com/blog/u.k.-cyber-strategy-developing-cybersecurity-skills-knowledge-and-culture www.secnews.physaphae.fr/article.php?IdArticle=4538073 False None None None CybeReason - Vendor blog Webinar May 12th 2022: Live Attack Simulation - Ransomware Threat Hunter Series Webinar May 12th 2022: Live Attack Simulation - Ransomware Threat Hunter Series Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. ]]> 2022-05-02T18:35:55+00:00 https://www.cybereason.com/blog/webinar-may-12th-2022-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4534265 True Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: Operation Sundevil and the Birth of the EFF Malicious Life Podcast: Operation Sundevil and the Birth of the EFF In May 1990, officials from several law enforcement agencies gathered in Phoenix, Arizona, to announce a nationwide crackdown on illegal computer activity. This massive operation, carried out by hundreds of Secret Service and FBI agents, was focused on a new type of crime: Hacking. Yet, as Isaac Newton said, for every action there is an equal and opposite reaction, and the reaction to Operation Sundevil was the birth of a new power in the cybersphere: the Electronic Frontier Foundation - check it out…]]> 2022-05-02T13:53:18+00:00 https://www.cybereason.com/blog/malicious-life-podcast-operation-sundevil-and-the-birth-of-the-eff www.secnews.physaphae.fr/article.php?IdArticle=4532727 False None None None CybeReason - Vendor blog Cybereason and Google Cloud: This is XDR Tour Cybereason and Google Cloud: This is XDR Tour This is XDR: A Revolution in Five Acts charts the evolution of cybersecurity over the past decade and how it's led to the solution Defenders have been waiting for: Cybereason XDR powered by Google Cloud.]]> 2022-04-28T19:29:31+00:00 https://www.cybereason.com/blog/cybereason-and-google-cloud-this-is-xdr-tour www.secnews.physaphae.fr/article.php?IdArticle=4518681 False None None None CybeReason - Vendor blog The U.K. Cyber Strategy and Minimizing the Impact of Cybersecurity Incidents The U.K. Cyber Strategy and Minimizing the Impact of Cybersecurity Incidents The following is the fourth installment of our blog series outlining how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy for 2022-2030. ]]> 2022-04-28T13:43:29+00:00 https://www.cybereason.com/blog/the-u.k.-cyber-strategy-and-minimizing-the-impact-of-cybersecurity-incidents www.secnews.physaphae.fr/article.php?IdArticle=4517408 True None None 2.0000000000000000 CybeReason - Vendor blog Distributed Machine Learning Models Done Right Distributed Machine Learning Models Done Right One of the core Cybereason products is designed to run on the user's machine and block advanced MalOps (malicious operations) in real-time. This requires a heuristic model, embedded in a C++ application, that runs on millions of machines simultaneously. To complicate things even further, the app runs on machines we don't own and have limited access to. ]]> 2022-04-27T12:52:10+00:00 https://www.cybereason.com/blog/distributed-machine-learning-models-done-right www.secnews.physaphae.fr/article.php?IdArticle=4513395 False None None None CybeReason - Vendor blog Why XDR Adoption Should Be a CISO Priority Why XDR Adoption Should Be a CISO Priority At the start of 2022, the results of a survey were published where CISOs and other security leaders shared their top cybersecurity challenges. “Managing increased risk of ransomware/cyber-extortion” came out on top, with 29% of respondents saying this is their biggest concern. ]]> 2022-04-27T12:43:48+00:00 https://www.cybereason.com/blog/xdr/why-xdr-adoption-should-be-a-ciso-priority www.secnews.physaphae.fr/article.php?IdArticle=4513396 False Guideline None None CybeReason - Vendor blog The State of Ransomware in the Retail Sector The State of Ransomware in the Retail Sector How many ransomware attacks did Retailers suffer in 2021? As reported by Infosecurity Magazine, the volume of ransomware attacks grew 105% between 2020 and 2021 to 623 million attack attempts. Much of this growth took place in the Public sector, with government agencies encountering a rise of 1885%. ]]> 2022-04-26T12:45:55+00:00 https://www.cybereason.com/blog/ransomware/the-state-of-ransomware-in-the-retail-sector www.secnews.physaphae.fr/article.php?IdArticle=4508643 False Ransomware None 2.0000000000000000 CybeReason - Vendor blog Malicious Life Podcast: MITRE Attack Flow Project Malicious Life Podcast: MITRE Attack Flow Project The MITRE Attack Flow Project is essentially a new way to visualize, analyze and share knowledge about sequences of adversary behavior. Ingrid Skoog, Ass. Director of R&D at the Center for Threat-Informed Defense, and Cybereason CISO Israel Barak discuss the benefits of the MITRE Attack Flow project to Defenders and executives alike - check it out…]]> 2022-04-25T13:10:28+00:00 https://www.cybereason.com/blog/malicious-life-podcast-mitre-attack-flow-project www.secnews.physaphae.fr/article.php?IdArticle=4504655 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems THREAT ANALYSIS REPORT: SocGholish and Zloader – From Fake Updates and Installers to Owning Your Systems The Cybereason Global Security Operations Center (GSOC) Team issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]> 2022-04-25T11:47:39+00:00 https://www.cybereason.com/blog/threat-analysis-report-socgholish-and-zloader-from-fake-updates-and-installers-to-owning-your-systems www.secnews.physaphae.fr/article.php?IdArticle=4504263 True Threat None None CybeReason - Vendor blog Seven Ways Cybereason Enhances Your Cyber Insurance Investment Seven Ways Cybereason Enhances Your Cyber Insurance Investment The volume, sophistication, and costs associated with today's cyberattacks, particularly ransomware, are forcing rapid changes in the risk assessment process that insurance carriers undertake to determine a policyholder's overall cyber risk and insurability. ]]> 2022-04-22T13:00:01+00:00 https://www.cybereason.com/blog/product/seven-ways-cybereason-enhances-your-cyber-insurance-investment www.secnews.physaphae.fr/article.php?IdArticle=4493421 False None None None CybeReason - Vendor blog Leveraging Cybereason DFIR to Contain Attacks in Minutes Leveraging Cybereason DFIR to Contain Attacks in Minutes Today, many organizations find themselves vulnerable to breaches because security analysts lack the tools to quickly investigate and remediate all aspects of a threat. The modern security toolkit is varied by necessity, with different tools required to effectively perform different tasks. ]]> 2022-04-21T12:00:00+00:00 https://www.cybereason.com/blog/leveraging-cybereason-dfir-to-contain-attacks-in-minutes www.secnews.physaphae.fr/article.php?IdArticle=4487784 False None None None CybeReason - Vendor blog How Strategic Detections Set XDR Apart How Strategic Detections Set XDR Apart Data breaches set a record high volume in 2021. According to CNET, 1,862 publicly reported data breaches took place over the course of the year. This volume surpassed the 1,108 data breaches in 2020 and broke the record of 1,506 security incidents set back in 2017.]]> 2022-04-20T12:54:34+00:00 https://www.cybereason.com/blog/how-strategic-detections-set-xdr-apart www.secnews.physaphae.fr/article.php?IdArticle=4481667 False None None None CybeReason - Vendor blog Malicious Life Podcast: The Aaron Swartz Story Malicious Life Podcast: The Aaron Swartz Story When 24-year-old Aaron Swartz was caught scraping millions of science articles off of JSTOR, he faced up to 35 years in prison plus a fine of up to 1 million dollars. Did Aaron's crime justify such a harsh punishment? Check it out…]]> 2022-04-19T15:19:33+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-aaron-swartz-story www.secnews.physaphae.fr/article.php?IdArticle=4478723 False None None None CybeReason - Vendor blog Ransomware Attacks: Can Cyber Insurance Protect Your Organization? Ransomware Attacks: Can Cyber Insurance Protect Your Organization? Cyber insurance premiums have increased significantly over the last few years. Just in October 2021, for instance, TechTarget shared how cyber insurance premiums had increased 50%, with some quotes jumping as high as 100%. ]]> 2022-04-19T12:53:51+00:00 https://www.cybereason.com/blog/ransomware-attacks-can-cyber-insurance-protect-your-organization www.secnews.physaphae.fr/article.php?IdArticle=4477963 False None None None CybeReason - Vendor blog SOC Modernization: Measures and Metrics for Success SOC Modernization: Measures and Metrics for Success Ask many SoC managers or business leaders how they measure the success of their security operations capabilities, and they will tell you it's the MTTD and MTTR.]]> 2022-04-14T12:49:45+00:00 https://www.cybereason.com/blog/soc-modernization-measures-and-metrics-for-success www.secnews.physaphae.fr/article.php?IdArticle=4448126 False Guideline None None CybeReason - Vendor blog Everything Cybereason at the 2022 RSA Conference! Everything Cybereason at the 2022 RSA Conference! The Cybereason team is excited to have you join us at the 2022 RSA Conference June 6-9, 2022 at the Moscone Center in San Francisco! Don't miss the immersive Cybereason digital experience at booth S-735 in the South Expo Hall. We're showing off the unmatched power and capability of Cybereason XDR powered by Google Cloud with a one-of-a-kind activation.]]> 2022-04-13T19:01:33+00:00 https://www.cybereason.com/blog/everything-cybereason-at-the-2022-rsa-conference www.secnews.physaphae.fr/article.php?IdArticle=4443498 False None None None CybeReason - Vendor blog Webinar April 26th: Profile of the Dark Economy of Ransomware Webinar April 26th: Profile of the Dark Economy of Ransomware Ransomware operators have steadily become more sophisticated and more aligned with nation-state actors making ransomware an existential threat for enterprises.]]> 2022-04-13T15:38:18+00:00 https://www.cybereason.com/blog/webinar-april-26th-profile-of-the-dark-economy-of-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4442028 False Ransomware,Threat None None CybeReason - Vendor blog Security Budgets Are Increasing - But So Are Attacks Security Budgets Are Increasing - But So Are Attacks Most organizations are planning to increase their cybersecurity budgets for 2022. In a 2021 survey covered by Dark Reading, 81% of organizations revealed that they're committed to growing their cybersecurity budgets over the coming year. ]]> 2022-04-13T12:37:29+00:00 https://www.cybereason.com/blog/security-budgets-are-increasing-but-so-are-attacks www.secnews.physaphae.fr/article.php?IdArticle=4441434 False None None None CybeReason - Vendor blog White Paper: Inside Complex RansomOps and the Ransomware Economy White Paper: Inside Complex RansomOps and the Ransomware Economy Ransomware operations have transformed dramatically over the last few years from a small cottage industry conducting largely nuisance attacks to a highly complex business model that is extremely efficient and specialized with an increasing level of innovation and technical sophistication. ]]> 2022-04-12T12:05:04+00:00 https://www.cybereason.com/blog/white-paper-inside-complex-ransomops-and-the-ransomware-economy www.secnews.physaphae.fr/article.php?IdArticle=4434530 False Ransomware None None CybeReason - Vendor blog Detecting Cyber Events is Key to U.K. Cybersecurity Strategy Detecting Cyber Events is Key to U.K. Cybersecurity Strategy The following is the third installment of our five-part blog series outlining how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy for 2022-2030.]]> 2022-04-11T17:10:06+00:00 https://www.cybereason.com/blog/detecting-cyber-events-is-key-to-u.k.-cybersecurity-strategy www.secnews.physaphae.fr/article.php?IdArticle=4430434 True None None None CybeReason - Vendor blog Malicious Life Podcast: The Russia-Ukraine Cyberwar Malicious Life Podcast: The Russia-Ukraine Cyberwar Before it invaded Ukraine, Russia was considered a cyber superpower–and rightfully so. But a month and a half into the war, the lights in Ukraine are still on, as well as cellular communications and other important infrastructure. Cybereason CEO Lior Div, CTO Yonatan Striem-Amit, and CSO Sam Curry examine what we know so far about the conflict and what we might see in the near future - check it out…]]> 2022-04-11T12:45:06+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-russia-ukraine-cyberwar www.secnews.physaphae.fr/article.php?IdArticle=4429349 False None None None CybeReason - Vendor blog Webinar April 27th: Solving the Incident Response Data Problem Webinar April 27th: Solving the Incident Response Data Problem When an organization is under attack, every second counts. Adversaries continue to evolve their attack tactics, techniques and procedures, which means that defenses and response actions must evolve as well.  Cybereason and IBM bring together industry leading tools and expertise that have done just that.]]> 2022-04-07T20:14:00+00:00 https://www.cybereason.com/blog/webinar-april-27th-solving-the-incident-response-data-problem www.secnews.physaphae.fr/article.php?IdArticle=4414259 False Guideline None None CybeReason - Vendor blog Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials Over the last several years, the Cybereason Nocturnus Team has been tracking different APT groups operating in the Middle East region, including two main sub-groups of the Hamas cyberwarfare division: Molerats and APT-C-23. Both groups are Arabic-speaking and politically-motivated that operate on behalf of Hamas, the Palestinian Islamic-fundamentalist movement and a terrorist organization that has controlled the Gaza strip since 2006.]]> 2022-04-06T18:00:17+00:00 https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials www.secnews.physaphae.fr/article.php?IdArticle=4407316 False None APT-C-23 None CybeReason - Vendor blog Evaluating XDR Solutions? Caveat Emptor - Buyer Beware Evaluating XDR Solutions? Caveat Emptor - Buyer Beware A recent study found that the majority of security professionals said that their organizations are planning to adopt Extended Detection and Response (XDR). The report indicated that 80% of infosec pros said XDR should be a top cybersecurity priority for their organization, and 68% said that their organization was planning on investing in an XDR solution deployment across their environments in 2022. ]]> 2022-04-06T13:16:38+00:00 https://www.cybereason.com/blog/evaluating-xdr-solutions-caveat-emptor-buyer-beware www.secnews.physaphae.fr/article.php?IdArticle=4405874 False None None None CybeReason - Vendor blog Malicious Life Podcast: Chris Roberts - Hackers on a Plane Malicious Life Podcast: Chris Roberts - Hackers on a Plane When Chris Roberts landed at Syracuse, NY, two FBI agents were waiting to escort him off the airplane. Apparently, this wasn't the first time that the Gray Hat hacker was suspected of hacking into an aircraft's control system - while in flight. Is risking the lives of hundreds of passengers a price worth paying for uncovering major vulnerabilities in an aircraft's network? Check it out…]]> 2022-04-05T15:46:55+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chris-roberts-hackers-on-a-plane www.secnews.physaphae.fr/article.php?IdArticle=4400246 False None None None CybeReason - Vendor blog Ransomware vs. AI: The Battle Between Machines Ransomware vs. AI: The Battle Between Machines According to recent reporting, the majority of respondents said their organizations were targeted by a ransomware attack in 2021. In an independent global study covered by Forbes, 80% of IT and security professionals indicated that ransomware attacks had hit their organizations during the year. ]]> 2022-04-05T13:15:06+00:00 https://www.cybereason.com/blog/ransomware-vs.-ai-the-battle-between-machines www.secnews.physaphae.fr/article.php?IdArticle=4399583 False Ransomware None None CybeReason - Vendor blog Cybereason and IBM: A Better Way to do Enterprise IR Cybereason and IBM: A Better Way to do Enterprise IR Attempts to develop robust enterprise incident response (IR) processes continue to be hampered by three main challenges: The increasing volume of cybersecurity incidents, a continued shortage of skilled cybersecurity talent, and a dizzying array of disconnected security tools.]]> 2022-04-04T17:56:10+00:00 https://www.cybereason.com/blog/cybereason-and-ibm-a-better-way-to-do-enterprise-ir www.secnews.physaphae.fr/article.php?IdArticle=4394829 False None None None CybeReason - Vendor blog Undefeated in MITRE ATT&CK Evaluations - Undefeated Against Ransomware Undefeated in MITRE ATT&CK Evaluations - Undefeated Against Ransomware MITRE ATT&CK Enterprise Evaluations have radically accelerated the effectiveness of today's cyber defenses the world over. These unbiased and transparent tests push vendors to develop and prove that their technology can stand up against today's most determined and sophisticated adversaries.  This year, Cybereason achieved the best results in the history of these evaluations: Cybereason leads the industry in the MITRE ATT&CK Enterprise Evaluation 2022]]> 2022-04-01T13:30:20+00:00 https://www.cybereason.com/blog/undefeated-in-mitre-attck-evaluations-undefeated-against-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4379374 False Ransomware,Guideline None None CybeReason - Vendor blog Lapsus$ Activity Betrays Nation-State Motivation Lapsus$ Activity Betrays Nation-State Motivation  ]]> 2022-04-01T09:00:00+00:00 https://www.cybereason.com/blog/lapsus-activity-betrays-nation-state-motivation www.secnews.physaphae.fr/article.php?IdArticle=4394831 False None None None CybeReason - Vendor blog Webinar April 14th: Live Attack Simulation - Ransomware Threat Hunter Series Webinar April 14th: Live Attack Simulation - Ransomware Threat Hunter Series Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. Join this session to learn more about how mature security teams can more effectively manage a modern ransomware operation and avoid a system-wide takeover by bad actors - delivered through a step-by-step walkthrough of an attack: Why ransomware continues to evolve & common delivery methods The differences and similarities between ransomware and other forms of malware Common methods attackers use to escalate their operations Reliable techniques Defenders can use to end active ransomware operators in their environments ]]> 2022-04-01T05:00:00+00:00 https://www.cybereason.com/blog/webinar-april-14th-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4394832 True Ransomware,Threat None None CybeReason - Vendor blog Cybereason Excels in the 2022 MITRE ATT&CK® Evaluations: 100% Prevention, Visibility and Real-Time Protection Cybereason Excels in the 2022 MITRE ATT&CK® Evaluations: 100% Prevention, Visibility and Real-Time Protection The MITRE Engenuity ATT&CK® Evaluations for Enterprise has quickly become the de facto authority for measuring the effectiveness of security solutions against real world scenarios that mimic advanced persistent threat attack progressions.]]> 2022-03-31T20:07:58+00:00 https://www.cybereason.com/blog/cybereason-excels-in-the-2022-mitre-attck-evaluations-100-prevention-visibility-and-real-time-protection www.secnews.physaphae.fr/article.php?IdArticle=4375400 False Threat None None CybeReason - Vendor blog How Cybereason Enables the U.K. to Defend Against Cyberattacks How Cybereason Enables the U.K. to Defend Against Cyberattacks The following is the second installment of our five-part blog series outlining how Cybereason XDR maps to each of the five objectives contained in the U.K. Government Cybersecurity Strategy for 2022-2030. ]]> 2022-03-31T12:41:28+00:00 https://www.cybereason.com/blog/how-cybereason-enables-the-uk-to-defend-against-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=4373539 False None None None CybeReason - Vendor blog CISO Stories Podcast: CISO Priorities for 2022 CISO Stories Podcast: CISO Priorities for 2022 For security leaders, it can be hard to catch a break when faced with the increasingly challenging task of defending their organizations from evolving threats while simultaneously fighting the battle of the budget in an effort to do more with less. ]]> 2022-03-31T12:37:04+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-ciso-priorities-for-2022 www.secnews.physaphae.fr/article.php?IdArticle=4373540 True Guideline None None CybeReason - Vendor blog Four Ways XDR Optimizes Your Security Stack Four Ways XDR Optimizes Your Security Stack Dwell time, or the time between when an attacker gains access to a network and when their activity is finally detected is a significant indicator for both the potential impact of a cyberattack on the organization and the overall effectiveness of an organization's security program efficacy.]]> 2022-03-30T13:06:43+00:00 https://www.cybereason.com/blog/four-ways-xdr-optimizes-your-security-stack www.secnews.physaphae.fr/article.php?IdArticle=4366836 False None None None