www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:23:33+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog SOC Modernization: A Mission to Block or to Disrupt? SOC Modernization: A Mission to Block or to Disrupt? As we all move more toward an ever increasingly digital world, periodically every business steps back and asks itself a number of questions around its digital resilience. At, or close to the top, is the question: Are my response processes still fit for purpose? ]]> 2022-03-29T13:26:02+00:00 https://www.cybereason.com/blog/soc-modernization-a-mission-to-block-or-to-disrupt www.secnews.physaphae.fr/article.php?IdArticle=4360070 False None None None CybeReason - Vendor blog How to Create an Effective Ransomware Response Plan How to Create an Effective Ransomware Response Plan The volume of ransomware attacks was unprecedented in 2021. For instance, in the third quarter of the year, security researchers documented 190.4 million ransomware attempts. This volume made Q3 2021 the highest quarter ever recorded, reported Help Net Security. The period almost surpassed the 195.7 million ransomware attack attempts logged during the first nine months of the previous year. ]]> 2022-03-29T13:15:18+00:00 https://www.cybereason.com/blog/how-to-create-an-effective-ransomware-response-plan www.secnews.physaphae.fr/article.php?IdArticle=4360071 False Ransomware None None CybeReason - Vendor blog MITRE ATT&CK: Wizard Spider and Sandworm Evaluations Explained MITRE ATT&CK: Wizard Spider and Sandworm Evaluations Explained Later this week MITRE Engenuity will be releasing the results from their fourth round of the ATT&CK Evaluations. This round focused on threat actors Wizard Spider and Sandworm. In this article, we'll review why MITRE is the preeminent organization providing third-party evaluations of vendor solutions, and the key metrics to look for when evaluating the effectiveness of a solution.]]> 2022-03-28T15:00:25+00:00 https://www.cybereason.com/blog/mitre-attck-wizard-spider-and-sandworm-evaluations-explained www.secnews.physaphae.fr/article.php?IdArticle=4354342 False Threat None None CybeReason - Vendor blog Malicious Life Podcast: DIE - A New Paradigm for Cybersecurity Malicious Life Podcast: DIE - A New Paradigm for Cybersecurity It's not every day that we have a guest who's suggesting a new paradigm for cyber security. DIE–an acronym for Distributed, Immutable and Ephemeral–is a framework for designing secure systems where we should treat our precious data less like pets and more like cattle.. Sounds confusing? New paradigms always are - check it out…]]> 2022-03-28T14:44:02+00:00 https://www.cybereason.com/blog/malicious-life-podcast-die-a-new-paradigm-for-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=4354343 False None None None CybeReason - Vendor blog Webinar April 7th: 2021 MITRE ATT&CK Evaluations Explained Webinar April 7th: 2021 MITRE ATT&CK Evaluations Explained The 2021 Round 4 MITRE ATT&CK evaluations focused on Wizard Spider and Sandworm, threat actor groups known to target large corporations and healthcare institutions. Wizard Spider is largely a financially motivated ransomware crime group conducting campaigns since 2017. The Sandworm team is a Russian Threat group that has been linked to the 2015 and 2016 targeting of Ukrainian electrical companies and the 2017 NotPetya attacks.]]> 2022-03-25T20:02:36+00:00 https://www.cybereason.com/blog/webinar-april-7th-2021-mitre-attck-evaluations-explained www.secnews.physaphae.fr/article.php?IdArticle=4342032 False Ransomware,Threat NotPetya,NotPetya None CybeReason - Vendor blog CEO Blog Series: No Sector Is Off-Limits for Russian Cyberattacks CEO Blog Series: No Sector Is Off-Limits for Russian Cyberattacks It has been a month now since Russia invaded Ukraine. While Russia continues its unprovoked rampage into Ukraine, and the Ukrainian people heroically defend their land, the rest of the world is on high alert for Russian cyberattacks. It is a virtual certainty that the attacks are coming-if they are not already ongoing-and organizations need to be prepared. ]]> 2022-03-25T17:47:09+00:00 https://www.cybereason.com/blog/no-sector-is-off-limits-for-russian-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=4341406 False None None None CybeReason - Vendor blog CISO Stories Podcast: Why Are We Still Failing at Security? CISO Stories Podcast: Why Are We Still Failing at Security? Why are we failing at security, and will we ever graduate from Cyber-Kindergarten? The industry has arguably made a lot of progress over the last three decades, yet the attackers still enjoy a distinct advantage. Wayman Cummings, VP of Security Operations at Unisys, joins the podcast to discuss how industry stagnation impacts the security for our critical infrastructure, when that rises to the level of national security issue, what value true public-private partnerships can bring, and more - check it out...]]> 2022-03-24T12:46:37+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-why-are-we-still-failing-at-security www.secnews.physaphae.fr/article.php?IdArticle=4334755 False None None None CybeReason - Vendor blog Cybereason Support for the U.K. Cybersecurity Strategy Part 1 Cybereason Support for the U.K. Cybersecurity Strategy Part 1 Western governments are on high alert for the potential of Russian state-sponsored cyberattacks in the wake of devastating economic sanctions imposed on Russia for its invasion of Ukraine.]]> 2022-03-24T12:40:39+00:00 https://www.cybereason.com/blog/cybereason-support-for-the-u.k.-cybersecurity-strategy-part-1 www.secnews.physaphae.fr/article.php?IdArticle=4334756 False None None None CybeReason - Vendor blog Operational Resilience: Bridging the Communications Gap Operational Resilience: Bridging the Communications Gap If you talk to most any CSO, they want to be relevant in the least–if not a member of the company's Board of Directors. It's human nature: we are both ambitious to get to the next level, but also curious to hear the conversations occurring that we both hope and yet also don't hope include our part of the business (depending if they are good or bad conversations, of course). ]]> 2022-03-23T13:11:32+00:00 https://www.cybereason.com/blog/operational-resilience-bridging-the-communications-gap www.secnews.physaphae.fr/article.php?IdArticle=4329236 False None None None CybeReason - Vendor blog AI-Driven XDR: Defeating the Most Complex Attack Sequences AI-Driven XDR: Defeating the Most Complex Attack Sequences What is an AI-driven XDR solution? AI-driven Extended Detection and Response (XDR) is a specific approach for advanced threat detection and automated response. AI-driven XDR extends continuous threat detection and monitoring across an organization's endpoints, cloud workloads, applications, and the network.]]> 2022-03-23T12:59:50+00:00 https://www.cybereason.com/blog/ai-driven-xdr-defeating-the-most-complex-attack-sequences www.secnews.physaphae.fr/article.php?IdArticle=4329237 False Threat None None CybeReason - Vendor blog Cybereason Taps Frank Koelmel as EMEA Region General Manager Cybereason Taps Frank Koelmel as EMEA Region General Manager Cybereason continues its exponential growth and expansion of the team by naming Frank Koelmel as EMEA Region General Manager. Koelmel has spent the past two years as the company's Central Europe Vice President, where he oversaw record sales growth and expansion. ]]> 2022-03-23T12:00:00+00:00 https://www.cybereason.com/blog/cybereason-taps-frank-koelmel-as-emea-region-general-manager www.secnews.physaphae.fr/article.php?IdArticle=4334759 False None None None CybeReason - Vendor blog Authentication Platform Okta Investigates Alleged Breach Authentication Platform Okta Investigates Alleged Breach Authentication platform Okta is reportedly investigating a potential breach after threat actors under the moniker Lapsus$ posted screenshots allegedly showing they had gained access to the company's internal environment. If confirmed, the attack could put the security of Okta's customers at risk. ]]> 2022-03-22T15:40:28+00:00 https://www.cybereason.com/blog/authentication-platform-okta-investigates-alleged-breach www.secnews.physaphae.fr/article.php?IdArticle=4324473 False Threat None None CybeReason - Vendor blog Malicious Life Podcast: Cyber PTSD Malicious Life Podcast: Cyber PTSD We usually count the damage from a cyberattack in Dollars and Euros, but the psychological damage to the victims is rarely discussed, if at all. So, what is the psychological and emotional toll from cyberattacks? Can scams, hacks, and breaches lead to Cyber Post-Traumatic Stress Disorder? Check it out…]]> 2022-03-22T15:12:38+00:00 https://www.cybereason.com/blog/malicious-life-podcast-cyber-ptsd www.secnews.physaphae.fr/article.php?IdArticle=4324474 False Guideline None None CybeReason - Vendor blog The State of Ransomware in the Manufacturing Sector The State of Ransomware in the Manufacturing Sector How many ransomware attacks did the Manufacturing Sector suffer in 2021? According to research, 21% of ransomware attacks targeted manufacturing organizations in 2020, and it was a similar story in 2021. ]]> 2022-03-22T13:34:39+00:00 https://www.cybereason.com/blog/the-state-of-ransomware-in-the-manufacturing-sector www.secnews.physaphae.fr/article.php?IdArticle=4323832 False Ransomware None None CybeReason - Vendor blog Cybereason vs. Carbon Black: Why Delayed Detections Matter Cybereason vs. Carbon Black: Why Delayed Detections Matter The U.S. Treasury Department estimates that U.S. companies have paid $1.6 billion in ransomware attacks since 2011. Given the lucrative nature of ransomware attacks, the threat shows no signs of diminishing. In fact, the ransomware threat is constantly changing and evolving as attackers use more and more sophisticated techniques and vulnerabilities to gain access to organizations' data and networks. ]]> 2022-03-22T13:15:00+00:00 https://www.cybereason.com/blog/cybereason-vs.-carbon-black-why-delayed-detections-matter www.secnews.physaphae.fr/article.php?IdArticle=4323833 False Ransomware,Threat None None CybeReason - Vendor blog Cybereason and Motorola Mobility: Real-Time Network Visibility Cybereason and Motorola Mobility: Real-Time Network Visibility Motorola Mobility, a wholly-owned subsidiary of Lenovo, faced a unique dilemma concerning its cybersecurity footprint. A succession of corporate acquisitions caused the staff number to vary over time. However, no matter the size of the organization, their core infrastructure security team remained relatively small. Nevertheless, this SecOps team was responsible for protecting the technical assets of an organization with nearly 40,000 employees and 60,000 endpoints.]]> 2022-03-18T16:51:01+00:00 https://www.cybereason.com/blog/cybereason-and-motorola-mobility-real-time-network-visibility www.secnews.physaphae.fr/article.php?IdArticle=4303649 False None None None CybeReason - Vendor blog Webinar March 31st: Live Attack Simulation - XDR vs. Modern Ransomware Webinar March 31st: Live Attack Simulation - XDR vs. Modern Ransomware Throughout history, sometimes truth ends up being even stranger than fiction. Today's parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. Attackers are operationalizing exploits at a record rate, targeting more organizations and are operating to reduce dwell time.]]> 2022-03-17T20:48:23+00:00 https://www.cybereason.com/blog/webinar-march-31st-live-attack-simulation-xdr-vs.-modern-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4300806 True Ransomware None None CybeReason - Vendor blog Enriching Raw Telemetry with the Cybereason Historical Data Lake Enriching Raw Telemetry with the Cybereason Historical Data Lake Regardless of whether you are performing Threat Hunting across your most recent dataset or your long-term historical datasets, an important dimension to your data is the enrichment and contextualization process. Contextual data provides the Threat Hunter (“hunter”) with additional data points and a more complete picture of the activity, allowing them to make more informed decisions about whether the activity should be investigated further or disregarded.  ]]> 2022-03-17T13:50:48+00:00 https://www.cybereason.com/blog/enriching-raw-telemetry-with-the-cybereason-historical-data-lake www.secnews.physaphae.fr/article.php?IdArticle=4298497 False Threat None None CybeReason - Vendor blog CISO Stories Podcast: The CISO Six Minute Rule CISO Stories Podcast: The CISO Six Minute Rule Sharing sensitive information on a website is likely to solicit a 'No Way” response from the CISO. Renee Guttmann was faced with these decisions early in her career and needed a way to determine and communicate the right pragmatic and ethical decision. She developed the 'Six-Month Rule” which has evolved into the “Six-Minute Rule” to guide these decisions. Join us as Renee articulates how to help appropriate stakeholders make informed risk/reward decisions - check it out...]]> 2022-03-17T13:45:11+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-the-ciso-six-minute-rule www.secnews.physaphae.fr/article.php?IdArticle=4298498 False None None None CybeReason - Vendor blog CEO Blog Series: Microsoft Can\'t Protect Themselves-How Will They Protect You? CEO Blog Series: Microsoft Can't Protect Themselves-How Will They Protect You? Microsoft released security updates for 89 vulnerabilities this week in its Patch Tuesday for the month of March. It was another monthly reminder of why companies should not rely on Microsoft for cybersecurity. ]]> 2022-03-16T14:47:09+00:00 https://www.cybereason.com/blog/microsoft-cant-protect-themselves-how-will-they-protect-you www.secnews.physaphae.fr/article.php?IdArticle=4292637 False None None None CybeReason - Vendor blog Malicious Life Podcast: How Resilient Is Our Banking System? Malicious Life Podcast: How Resilient Is Our Banking System? What is the most critical of all critical infrastructure? Is it Electricity? Water Supply? According to Jeff Engles, CEO of Conquest Cyber, it's our Banking and Finance systems. Jeff spoke with Nate Nelson, our Senior Producer, about the resilience of our financial system, worst-case scenarios, and will backups be able to save our butts? Check it out…]]> 2022-03-16T13:42:11+00:00 https://www.cybereason.com/blog/malicious-life-podcast-how-resilient-is-our-banking-system www.secnews.physaphae.fr/article.php?IdArticle=4292049 False None None None CybeReason - Vendor blog Leveraging the X in XDR: Correlating Across Multiple Sources of Telemetry Leveraging the X in XDR: Correlating Across Multiple Sources of Telemetry Several trends are driving Managed Detection and Response (MDR) adoption as a viable alternative for organizations that don't necessarily have the resources on-hand to conduct intense threat hunting internally. The MDR market is expected to reach over $7 billion by 2028. That's up from $974.9 million in 2020, per Big News Network.]]> 2022-03-16T12:43:23+00:00 https://www.cybereason.com/blog/leveraging-the-x-in-xdr-correlating-across-multiple-sources-of-telemetry www.secnews.physaphae.fr/article.php?IdArticle=4292050 False Threat None None CybeReason - Vendor blog Webinar March 29th: Assessing the Cyberattack Risk in the Russia-Ukraine Conflict Webinar March 29th: Assessing the Cyberattack Risk in the Russia-Ukraine Conflict The situation in Ukraine continues to be tenuous, and global intelligence sources are advising that the threat of Russian state-sponsored and state-condoned attacks targeting Western nations and organizations remains high. Cyberattacks by groups supporting Russian interests have been observed, but experts have noted that we likely have not seen the full potential of a Russian cyber offensive…yet.]]> 2022-03-16T12:33:41+00:00 https://www.cybereason.com/blog/webinar-march-29th-assessing-the-cyberattack-risk-in-the-russia-ukraine-conflict www.secnews.physaphae.fr/article.php?IdArticle=4292051 False Threat None None CybeReason - Vendor blog How to Prevent \'Out of Memory\' Errors in Java-Based Kubernetes Pods How to Prevent 'Out of Memory' Errors in Java-Based Kubernetes Pods When developing Java applications that run on Kubernetes, one of our key tasks before we head to production is testing our app in high loads of data and validating its ability to scale. It is only then that we often find memory leaks or configurations that were not properly tuned which could lead to excessive memory consumption and finally crash our app. ]]> 2022-03-15T13:01:50+00:00 https://www.cybereason.com/blog/how-to-prevent-out-of-memory-in-java-based-kubernetes-pods www.secnews.physaphae.fr/article.php?IdArticle=4284882 False Guideline Uber None CybeReason - Vendor blog Leveraging Artificial Intelligence to Prevent RansomOps Attacks Leveraging Artificial Intelligence to Prevent RansomOps Attacks Ransomware attacks increased dramatically in both volume and sophistication throughout 2021. As reported by Help Net Security, researchers observed a 148% increase in global ransomware attacks through the third quarter (Q3) of 2021. This brought the total volume of ransomware infections up to 470 million for the year's first nine months. ]]> 2022-03-15T12:50:33+00:00 https://www.cybereason.com/blog/leveraging-artificial-intelligence-to-prevent-ransomops-attacks www.secnews.physaphae.fr/article.php?IdArticle=4284883 False Ransomware None None CybeReason - Vendor blog Defend Forward: Taking the Fight to the Adversary Defend Forward: Taking the Fight to the Adversary Thirty years ago, when I first started working in cybersecurity, I remember joking with my wife, who worked in healthcare, that she saved people's lives while I saved their computers. How times have changed…]]> 2022-03-14T13:14:11+00:00 https://www.cybereason.com/blog/defend-forward-taking-the-fight-to-the-adversary www.secnews.physaphae.fr/article.php?IdArticle=4277393 False None None None CybeReason - Vendor blog Malicious Life Podcast: Crypto AG Part 3 - The Truth is Revealed Malicious Life Podcast: Crypto AG Part 3 - The Truth is Revealed By the 1970s, Crypto AG was a large and thriving company, employing over 400 people. This final episode of the series is going to explore how a spying operation, affecting over 100 countries for 70 years, was kept secret the whole time from governments, military and intelligence services, and even the company's own personnel - check it out…]]> 2022-03-10T15:27:30+00:00 https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-part-3-the-truth-is-revealed www.secnews.physaphae.fr/article.php?IdArticle=4254729 False None None None CybeReason - Vendor blog CISO Stories Podcast: Lessons Learned from Building an ISAC CISO Stories Podcast: Lessons Learned from Building an ISAC Information Sharing and Analysis Centers (ISACs) were formed to promote the centralized sharing of threat intelligence within a particular sector. These have grown since the first ISAC in the late 1990's and now represent over 20 industry sectors. Grant Sewell, Director of Security at AHEAD, shares his experience in working with an ISAC and how this benefited his organization and the broader CISO community - check it out...]]> 2022-03-10T14:39:49+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-lessons-learned-from-building-an-isac www.secnews.physaphae.fr/article.php?IdArticle=4254730 False Threat None None CybeReason - Vendor blog Threat Hunting: From LOLBins to Your Crown Jewels Threat Hunting: From LOLBins to Your Crown Jewels Continuous, real-time threat hunting is one of the key capabilities that organizations need today. By sharing the strategies that our Threat Hunting and Incident Response teams use, I hope to show you how you can implement threat hunting on your network as an integral part of your security operations.]]> 2022-03-09T14:41:21+00:00 https://www.cybereason.com/blog/threat-hunting-from-lolbins-to-your-crown-jewels www.secnews.physaphae.fr/article.php?IdArticle=4250340 False Threat None None CybeReason - Vendor blog Cybereason XDR: Intelligence-Driven Hunting and Investigation Cybereason XDR: Intelligence-Driven Hunting and Investigation For many Security Operations Centers (SOCs), conducting useful queries using a traditional Security Information and Event Management (SIEM) requires training and familiarity with syntax language, and deep analysis to take action on the results of a particular hunt. ]]> 2022-03-09T14:30:00+00:00 https://www.cybereason.com/blog/cybereason-xdr-intelligence-driven-hunting www.secnews.physaphae.fr/article.php?IdArticle=4250341 True None None None CybeReason - Vendor blog SecOps: Getting Behind the Wheel with XDR SecOps: Getting Behind the Wheel with XDR Earlier this year, we weighed the costs of ransomware prevention and recovery. This article ties into a greater discussion regarding the differences between taking an assertive, proactive approach versus a reactive approach to digital security. Let's now wade into this conversation directly.]]> 2022-03-09T14:27:56+00:00 https://www.cybereason.com/blog/secops-getting-behind-the-wheel-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=4250342 False Ransomware None None CybeReason - Vendor blog International Women\'s Day: Defenders Share Advice on How to #BreaktheBias International Women's Day: Defenders Share Advice on How to #BreaktheBias Imagine we lived in a world where there was no gender bias… a world where differences are celebrated. That's how we started out the conversation as we celebrated women at Cybereason in an International Women's Day panel discussion with women defenders from across the organization. ]]> 2022-03-08T20:03:33+00:00 https://www.cybereason.com/blog/international-womens-day-defenders-share-advice-on-how-to-breakthebias www.secnews.physaphae.fr/article.php?IdArticle=4247473 False None None None CybeReason - Vendor blog CEO Blog Series: Our People are the Secret to the Success of Cybereason CEO Blog Series: Our People are the Secret to the Success of Cybereason As I reflect on our celebration of Employee Appreciation Day last week, I feel it's important to publicly share how much I appreciate and value our employees at Cybereason. The reality, though, is that I appreciate every Cybereason employee every day--because I recognize that our people are the core strength of our company.]]> 2022-03-08T16:15:00+00:00 https://www.cybereason.com/blog/ceo-blog-series-our-people-are-the-secret-to-the-success-of-cybereason www.secnews.physaphae.fr/article.php?IdArticle=4277400 False None None None CybeReason - Vendor blog Threat Detection: Making the Complicated Simple Again Threat Detection: Making the Complicated Simple Again There are certain immutable things in cybersecurity; the volume of threats will only ever grow, the acceptable time for businesses to be offline will only get shorter. What is clear is the longer you are breached, the greater the potential for business disruption and commercial impact, and ransomware has moved that scale from days or weeks to hours or minutes. ]]> 2022-03-08T14:53:12+00:00 https://www.cybereason.com/blog/threat-detection-making-the-complicated-simple-again www.secnews.physaphae.fr/article.php?IdArticle=4246210 False Ransomware None None CybeReason - Vendor blog The Impact of Ransomware in the Healthcare Sector The Impact of Ransomware in the Healthcare Sector How many ransomware attacks did the Healthcare sector suffer in 2021? In a recent survey of healthcare organizations, 34% of respondents indicated they had suffered a ransomware attack in 2021. The healthcare sector thereby fared better than the global average of 37% for all industries combined. It also came in under retail and education, sectors where 44% of respondents revealed that they had weathered an infection.]]> 2022-03-08T14:46:56+00:00 https://www.cybereason.com/blog/the-impact-of-ransomware-in-the-healthcare-sector www.secnews.physaphae.fr/article.php?IdArticle=4246211 False Ransomware None None CybeReason - Vendor blog Cybereason Taps Security Industry Veteran Greg Day as Global Field CISO Cybereason Taps Security Industry Veteran Greg Day as Global Field CISO Cybereason continues its exponential growth and expansion of the team by welcoming Greg Day to the company as Vice President and Global Field Chief Information Security Officer (CISO) for the EMEA region. ]]> 2022-03-08T13:00:00+00:00 https://www.cybereason.com/blog/cybereason-taps-security-industry-veteran-greg-day-as-global-field-ciso www.secnews.physaphae.fr/article.php?IdArticle=4245687 False None None None CybeReason - Vendor blog DFIR Demystified: Understanding Digital Forensics Incident Response DFIR Demystified: Understanding Digital Forensics Incident Response The modern security toolkit is varied by necessity, with different tools required to effectively perform different tasks. As part of a successful defense-in-depth strategy, often deep-dive analysis is needed to fully understand and respond to serious events and data breaches. While not needed for every event and every investigation, Digital Forensics and Incident Response (DFIR) is absolutely essential for InfoSec teams dealing with sophisticated cyber adversaries.]]> 2022-03-07T19:07:32+00:00 https://www.cybereason.com/blog/dfir-demystified-understanding-digital-forensics-incident-response www.secnews.physaphae.fr/article.php?IdArticle=4242774 False None None None CybeReason - Vendor blog THREAT ALERT: Emotet Targeting Japanese Organizations THREAT ALERT: Emotet Targeting Japanese Organizations The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them.]]> 2022-03-07T16:57:52+00:00 https://www.cybereason.com/blog/threat-alert-emotet-targeting-japanese-organizations www.secnews.physaphae.fr/article.php?IdArticle=4242496 True Threat None None CybeReason - Vendor blog Malicious Life Podcast: Quantum Cybersecurity Malicious Life Podcast: Quantum Cybersecurity Quantum Computing is a fascinating and revolutionary technology that has been gaining significant ground in the past decade, with researchers from both academia and the commercial sector - such as Google and IBM - announcing major breakthroughs every few weeks. Mike Redding, CTO of Quantropi, a company specializing in Quantum Encryption - claims that this revolution is even closer than most of us think - check it out…]]> 2022-03-07T13:51:33+00:00 https://www.cybereason.com/blog/malicious-life-podcast-quantum-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=4241841 False None None None CybeReason - Vendor blog Cybereason vs. HermeticWiper and IsaacWiper Cybereason vs. HermeticWiper and IsaacWiper Ukraine has been attacked by several new data wipers as the cyberwar that started in 2013 enters a new round. For the last couple of months, there has been a wave of cyberattacks targeting Ukrainian interests involving website defacements and DDOS attacks.]]> 2022-03-03T19:07:38+00:00 https://www.cybereason.com/blog/cybereason-vs.-hermeticwiper-and-isaacwiper www.secnews.physaphae.fr/article.php?IdArticle=4222812 False None None None CybeReason - Vendor blog Cybereason and MITRE Engenuity Center for Threat-Informed Defense Launch the Attack Flow Project Cybereason and MITRE Engenuity Center for Threat-Informed Defense Launch the Attack Flow Project Cybereason is pleased to announce the launch of the Attack Flow Project in collaboration with the Center for Threat-Informed Defense, a joint effort aimed at developing a common data format for describing sequences of adversary behavior to improve defensive capabilities.]]> 2022-03-03T13:00:00+00:00 https://www.cybereason.com/blog/cybereason-and-mitre-engenuity-center-for-threat-informed-defense-launch-the-attack-flow-project www.secnews.physaphae.fr/article.php?IdArticle=4221260 False None None None CybeReason - Vendor blog CISO Stories Podcast: Richard Clarke - Getting the Board on Board with Security CISO Stories Podcast: Richard Clarke - Getting the Board on Board with Security Richard Clarke spent several decades serving Presidents of both parties and understands what is necessary to implement effective security programs. Join us as he provides pragmatic tips for working with the Board of Directors to effectively communicate the investment need and articulate the benefits in terms the Board can support - check it out...]]> 2022-03-03T09:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-richard-clarke-getting-the-board-on-board-with-security www.secnews.physaphae.fr/article.php?IdArticle=4221261 False None None None CybeReason - Vendor blog XDR is Here: How and Why to Get Started XDR is Here: How and Why to Get Started The Extended Detection and Response (XDR) market is expected to increase over the next few years. Grand View Research wrote that the global XDR market will grow at a CAGR of 19.9% between 2021 and 2028. This surge will bring the market's value up to $2.06 billion by that time.]]> 2022-03-02T14:04:00+00:00 https://www.cybereason.com/blog/xdr-is-here-how-and-why-to-get-started www.secnews.physaphae.fr/article.php?IdArticle=4215925 False None None None CybeReason - Vendor blog Cybereason vs. BlackCat Ransomware Cybereason vs. BlackCat Ransomware Since its first emergence in November 2021, the Cybereason Nocturnus team has been tracking the BlackCat Ransomware (aka ALPHV), which has been called “2021's most sophisticated ransomware”. ]]> 2022-03-01T13:37:07+00:00 https://www.cybereason.com/blog/cybereason-vs.-blackcat-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4207522 False Ransomware None None CybeReason - Vendor blog What\'s Next in the Evolution of Complex RansomOps? What's Next in the Evolution of Complex RansomOps? Ransomware gangs introduced lots of new tricks in 2021. Some attack groups went beyond double extortion to impose even more pressure on their victims. With triple extortion, attackers began offering to sell victims' data to competitors or investors unless they paid the ransom. ]]> 2022-03-01T13:31:11+00:00 https://www.cybereason.com/blog/whats-next-in-the-evolution-of-complex-ransomops www.secnews.physaphae.fr/article.php?IdArticle=4207523 False None None None CybeReason - Vendor blog CEO Blog Series: Ukraine Conflict Confirms Russian Cybercrime Connection CEO Blog Series: Ukraine Conflict Confirms Russian Cybercrime Connection I am watching the ongoing tragedy in Ukraine with the rest of the world. It is heartbreaking and my thoughts are with the people of Ukraine. I had hoped that diplomatic efforts would work and that Putin would pull his troops back, but I would be lying if I said I was completely surprised that Russia launched a full-scale invasion of Ukraine. Aside from displaying Putin's imperialist aspirations, this conflict has also revealed the extent to which Russia has integrated cyber into its military strategy and how much control Russia has over allegedly “independent” cybercrime gangs.  ]]> 2022-02-28T17:36:42+00:00 https://www.cybereason.com/blog/ceo-blog-series-ukraine-conflict-confirms-russian-cybercrime-connection www.secnews.physaphae.fr/article.php?IdArticle=4201505 False None None None CybeReason - Vendor blog Malicious Life Podcast: Crypto AG Part 2 - The Death of Bo Jr. Malicious Life Podcast: Crypto AG Part 2 - The Death of Bo Jr. How did Boris Hagelin succeed in selling compromised cipher machines to half the world over more than 50 years? Some have speculated that it was some kind of backdoor - but no, it was more clever than that. And Bo Jr., Hagelin's son, who became an important part of his father's company, did not approve of the secret deal with the NSA - check it out…]]> 2022-02-28T13:01:15+00:00 https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-part-2-the-death-of-bo-jr www.secnews.physaphae.fr/article.php?IdArticle=4200285 False None None None CybeReason - Vendor blog How Black History Icon Bessie Coleman Exemplifies Our Core Values How Black History Icon Bessie Coleman Exemplifies Our Core Values At Cybereason, we know that building a truly inclusive workplace means ensuring a deeply ingrained and reinforced culture that makes each Defender feel respected, appreciated and encouraged in their work. ]]> 2022-02-24T14:18:16+00:00 https://www.cybereason.com/blog/employee-spotlight-black-history-icon-bessie-coleman-exemplifies-our-core-values www.secnews.physaphae.fr/article.php?IdArticle=4177567 False None None None CybeReason - Vendor blog Two Things Every Zero Trust Initiative Must Have Two Things Every Zero Trust Initiative Must Have Although every organization's journey to achieving Zero Trust will be different, there are two factors that will determine your ability to maintain a system of trust by verification on a continuous basis: Data and speed.]]> 2022-02-24T14:00:04+00:00 https://www.cybereason.com/blog/two-things-every-zero-trust-initiative-must-have www.secnews.physaphae.fr/article.php?IdArticle=4177568 False None None None CybeReason - Vendor blog CISO Stories Podcast: Understanding and Preparing for the Next Log4j CISO Stories Podcast: Understanding and Preparing for the Next Log4j The issues created by the recently disclosed Log4j vulnerability are bigger than you might expect and will have long-lasting implications. So, what was the Log4j vulnerability really, what can be done to reduce the risk it poses to organizations, and how can we better prepare for the next Log4j-level event? Benny Lakunishok, co-founder and CEO of Zero Networks, takes us deeper - check it out...]]> 2022-02-24T13:51:14+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-understanding-and-preparing-for-the-next-log4j www.secnews.physaphae.fr/article.php?IdArticle=4177569 False Vulnerability None None CybeReason - Vendor blog Why Telemetry Correlations are Essential to XDR Why Telemetry Correlations are Essential to XDR Most organizations will be directing some of their security budget to incorporate an Extended Detection and Response (XDR) solution in 2022. As reported by TechTarget, 70% of organizations intend to allocate budget spend for XDR in this period, and it's not difficult to understand why. ]]> 2022-02-23T14:22:00+00:00 https://www.cybereason.com/blog/why-telemetry-correlations-are-essential-to-xdr www.secnews.physaphae.fr/article.php?IdArticle=4172427 False None None None CybeReason - Vendor blog Three Questions to Ask about Ransomware Preparedness Three Questions to Ask about Ransomware Preparedness Ransomware operations, or RansomOps™, have evolved dramatically over the last few years, growing from a small subset of mostly nuisance attacks to a mature business model specialization and an increasing pace of innovation and technical sophistication. ]]> 2022-02-22T14:00:45+00:00 https://www.cybereason.com/blog/three-questions-to-ask-about-ransomware-preparedness www.secnews.physaphae.fr/article.php?IdArticle=4166848 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Why Do APTs Use Ransomware? Malicious Life Podcast: Why Do APTs Use Ransomware? Complex cybercrime attacks are increasingly showing more overlap with nation-state sponsored attacks, with some cybercriminal groups adopting more sophisticated TTPs and attack progressions, and some APTs adopting ransomware payloads to distract, disrupt and destroy targeted systems. ]]> 2022-02-22T13:56:36+00:00 https://www.cybereason.com/blog/malicious-life-podcast-why-do-apts-use-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4166849 False Ransomware None None CybeReason - Vendor blog Everything Cybereason at Cybertech Tel Aviv 2022! Everything Cybereason at Cybertech Tel Aviv 2022! Cybereason is going to be at Cybertech 2022 March 1-3 in Tel Aviv. Cybertech is the cyber ecosystem's foremost networking platform, conducting industry-related events all around the globe. ]]> 2022-02-22T08:00:00+00:00 https://www.cybereason.com/blog/everything-cybereason-at-cybertech-tel-aviv-2022 www.secnews.physaphae.fr/article.php?IdArticle=4166850 False None None None CybeReason - Vendor blog Shields Up: Is Your Ransomware Protection What It Should Be? Shields Up: Is Your Ransomware Protection What It Should Be? The recent 'Shields Up' initiative from the Cybersecurity and Infrastructure Security Agency (CISA), an effort to warn businesses and critical infrastructure operators to prepare for cyberattacks coinciding with the imminent Russian invasion of Ukraine, may have one critical weak spot: ransomware protection.]]> 2022-02-18T20:13:33+00:00 https://www.cybereason.com/blog/shields-up-is-your-ransomware-protection-what-it-should-be www.secnews.physaphae.fr/article.php?IdArticle=4146517 False Ransomware None None CybeReason - Vendor blog Webinar March 15th: CISO Roundtable - Top CISO Priorities for 2022 Webinar March 15th: CISO Roundtable - Top CISO Priorities for 2022 For security leaders, it can be hard to catch a break when faced with the increasingly challenging task of defending their organizations from evolving threats while simultaneously fighting the battle of the budget in an effort to do more with less.]]> 2022-02-18T16:53:18+00:00 https://www.cybereason.com/blog/webinar-march-15th-ciso-roundtable-top-ciso-priorities-for-2022 www.secnews.physaphae.fr/article.php?IdArticle=4145338 False Guideline None None CybeReason - Vendor blog Cybereason Named to 10 Hottest XDR Companies to Watch List for 2022 Cybereason Named to 10 Hottest XDR Companies to Watch List for 2022 Cybereason is stoked to be named as one of the 10 Hottest XDR Security Companies to Watch in 2022 by CRN. This news comes on the heels of Cybereason launching Cybereason XDR powered by Google Cloud, the industry's first true XDR platform.]]> 2022-02-17T14:52:55+00:00 https://www.cybereason.com/blog/cybereason-named-to-10-hottest-xdr-companies-to-watch-list-for-2022 www.secnews.physaphae.fr/article.php?IdArticle=4139304 False None None None CybeReason - Vendor blog CISO Stories Podcast: A Cost-Effective Approach to Security Risk Management CISO Stories Podcast: A Cost-Effective Approach to Security Risk Management Risk management is arguably one of the most important functions of the CISO. So, how does the CISO establish the value proposition for an investment? Jack Jones, Chief Risk Scientist at RiskLens, discusses using a well-tested risk framework to evaluate and compare the current state of loss exposure and the expected reduction from applying a set of alternative controls - check it out...]]> 2022-02-17T13:53:55+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-a-cost-effective-approach-to-security-risk-management www.secnews.physaphae.fr/article.php?IdArticle=4139305 False None None None CybeReason - Vendor blog Webinar March10th 2022: Live Attack Simulation - XDR vs. No-Macro RansomOps Webinar March10th 2022: Live Attack Simulation - XDR vs. No-Macro RansomOps Throughout history, sometimes truth ends up being even stranger than fiction. Today's parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. Attackers are operationalizing exploits at a record rate, targeting more organizations and are operating to reduce dwell time.]]> 2022-02-17T08:00:00+00:00 https://www.cybereason.com/blog/webinar-march10th-2022-live-attack-simulation-xdr-vs.-no-macro-ransomops www.secnews.physaphae.fr/article.php?IdArticle=4146521 False Ransomware None None CybeReason - Vendor blog Securing Critical Infrastructure with XDR Securing Critical Infrastructure with XDR In January, CISA, the FBI and the NSA released a joint Cybersecurity Advisory (CSA), titled Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure, that provided an overview of Russian state-sponsored cyber operations, including commonly observed tactics, techniques and procedures (TTPs), as well as detection actions, incident response guidance, and recommended mitigations. "Russian state-sponsored APT actors have used sophisticated cyber capabilities to target a variety of U.S. and international critical infrastructure organizations, including those in the Defense Industrial Base as well as the Healthcare and Public Health, Energy, Telecommunications, and Government Facilities Sectors," the advisory states.  "Russian state-sponsored cyber operations against critical infrastructure organizations have specifically targeted operational technology (OT)/industrial control systems (ICS) networks with destructive malware... CISA, the FBI, and NSA encourage the cybersecurity community-especially critical infrastructure network defenders-to adopt a heightened state of awareness and to conduct proactive threat hunting." While critical infrastructure defense has always been high priority objective, there's still some disconnect in the world of critical infrastructure security around preparedness. According to a report covered by PRNewswire, a majority (84%) of critical infrastructure organizations indicated they had suffered at least one security breach involving their Operational Technology (OT) between 2018 and 2021; yet, 56% of respondents to the same study said they were “highly confident” that they wouldn't experience an OT breach in 2022.]]> 2022-02-16T14:10:02+00:00 https://www.cybereason.com/blog/securing-critical-infrastructure-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=4137694 False Threat None None CybeReason - Vendor blog Addressing the Risk from Cyberattacks in the Russia-Ukraine Conflict Addressing the Risk from Cyberattacks in the Russia-Ukraine Conflict The situation in Ukraine continues to fluctuate, and U.S. intelligence sources are advising that Russia is preparing for an imminent invasion. Cyberattacks have already been observed in the conflict, and I expect diversions, distractions, and false flags as tensions escalate. There is also the potential risk of other threat actors being opportunistic under the cover of Russian aggression.]]> 2022-02-15T22:11:13+00:00 https://www.cybereason.com/blog/addressing-the-risk-from-cyberattacks-in-the-russia-ukraine-conflict www.secnews.physaphae.fr/article.php?IdArticle=4136011 False Threat None None CybeReason - Vendor blog Cybereason vs. WhisperGate Wiper Cybereason vs. WhisperGate Wiper As geopolitical tensions are escalating between Russia and Ukraine, the cyberwar that has been going on since 2013 recently had another round of escalation. For the last couple of months, there have been a wave of cyberattacks targeting Ukrainian interests involving website defacements and DDOS attacks.]]> 2022-02-15T18:58:52+00:00 https://www.cybereason.com/blog/cybereason-vs.-whispergate-wiper www.secnews.physaphae.fr/article.php?IdArticle=4134730 False None None None CybeReason - Vendor blog How to Prevent Ransomware Attacks at the Earliest Stages How to Prevent Ransomware Attacks at the Earliest Stages Ransomware attacks are one of the most challenging threats organizations face today. At the same time, it is difficult, if not impossible, for private-sector Defenders to draw a clear distinction between attacks supporting nation-state geopolitical interests and a good deal of the more complex ransomware attacks we see today.]]> 2022-02-15T13:18:00+00:00 https://www.cybereason.com/blog/how-to-prevent-ransomware-attacks-at-the-earliest-stages www.secnews.physaphae.fr/article.php?IdArticle=4132893 False Ransomware None None CybeReason - Vendor blog Cybereason Partners with EGUARDIAN to Defend Organizations Against Complex Cyberattacks Cybereason Partners with EGUARDIAN to Defend Organizations Against Complex Cyberattacks Cybereason, the XDR company, today announced we have joined forces with EGUARDIAN, a leading Value-Added Distributor and a technology provider in the Asia Pacific (APAC) region. The partnership will offer enhanced protection from complex cyberattacks to enterprises in Sri Lanka. Cybereason is the newest addition to EGUARDIAN's expanding portfolio of leading and innovative technology brands.]]> 2022-02-14T22:19:51+00:00 https://www.cybereason.com/blog/cybereason-partners-with-eguardian-to-defend-organizations-against-complex-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=4129347 False Guideline None None CybeReason - Vendor blog Malicious Life Podcast: Crypto AG - The Greatest Espionage Operation Ever Part 1 Malicious Life Podcast: Crypto AG - The Greatest Espionage Operation Ever Part 1 General McArthur, Egypt's Anwar Sadat, and Iran's Ayatollah Khomeini: these are just a few of the dozens (likely hundreds) of targets in arguably the biggest, most ambitious hacking operation ever. A secret mission that lasted nearly a century, and influenced the course of so many of the most important events of history. Uncover the history you thought you knew - check it out…]]> 2022-02-14T12:55:55+00:00 https://www.cybereason.com/blog/malicious-life-podcast-crypto-ag-the-greatest-espionage-operation-ever-part-1 www.secnews.physaphae.fr/article.php?IdArticle=4124977 False None None None CybeReason - Vendor blog THREAT ANALYSIS REPORT: All Paths Lead to Cobalt Strike - IcedID, Emotet and QBot THREAT ANALYSIS REPORT: All Paths Lead to Cobalt Strike - IcedID, Emotet and QBot The Cybereason Global Security Operations Center Team (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them. ]]> 2022-02-10T11:00:00+00:00 https://www.cybereason.com/blog/threat-analysis-report-all-paths-lead-to-cobalt-strike-icedid-emotet-and-qbot www.secnews.physaphae.fr/article.php?IdArticle=4105031 True Threat,Guideline None None CybeReason - Vendor blog Cybereason Executives Abigail Maines and Stephan Tallent Named 2022 CRN Channel Chiefs Cybereason Executives Abigail Maines and Stephan Tallent Named 2022 CRN Channel Chiefs Over the past year, Cybereason has grown our team by about 1000 people and expanded our Partner organization roster tremendously. We are fortunate to have some of the brightest and best from across the security field working diligently to support our Defenders in the field and help our valued Partners grow their business.]]> 2022-02-10T10:45:00+00:00 https://www.cybereason.com/blog/cybereason-executives-abigail-maines-and-stephan-tallent-named-2022-crn-channel-chiefs www.secnews.physaphae.fr/article.php?IdArticle=4124979 False None None None CybeReason - Vendor blog CISO Stories Podcast: Creating Security Budget Where There is No Budget CISO Stories Podcast: Creating Security Budget Where There is No Budget Over the years, security departments acquire tool after tool, sometimes integrated, and many times under-utilized. Kevin Richards, President at Secure Systems Innovation, walks through a very creative method for getting the budget you need, and explains how to leverage the current environment to “find” new sources of funding for the right cybersecurity investments - check it out...]]> 2022-02-10T10:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-creating-security-budget-where-there-is-no-budget www.secnews.physaphae.fr/article.php?IdArticle=4124980 False Tool None None CybeReason - Vendor blog Cybereason XDR for Cloud Workloads: A New Approach to Cloud Security Cybereason XDR for Cloud Workloads: A New Approach to Cloud Security The modern data-driven economy has accelerated the adoption of cloud computing. In fact, analysts predict there will be more than 100 zettabytes (a billion terabytes) of data stored in the cloud by 2024. ]]> 2022-02-09T12:00:00+00:00 http://www.cybereason.com/blog/xdr-for-cloud-workloads-a-new-approach-to-cloud-security www.secnews.physaphae.fr/article.php?IdArticle=4099503 False None None None CybeReason - Vendor blog Debunking Three Common Misconceptions about XDR Debunking Three Common Misconceptions about XDR So, what is XDR anyway? Shorthand for Extended Detection and Response, XDR is a security approach that delivers unified detection and response capabilities across an organization's entire network infrastructure, and we've seen the proliferation of XDR services and platforms over the past few years. ]]> 2022-02-09T10:00:00+00:00 https://www.cybereason.com/blog/debunking-three-common-misconceptions-about-xdr www.secnews.physaphae.fr/article.php?IdArticle=4105033 False None None None CybeReason - Vendor blog Webinar March 9th 2022: Protecting Containers at Runtime with Cybereason XDR for Cloud Workloads Webinar March 9th 2022: Protecting Containers at Runtime with Cybereason XDR for Cloud Workloads Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. ]]> 2022-02-09T08:00:00+00:00 https://www.cybereason.com/blog/webinar-march-9th-2022-protecting-containers-at-runtime-with-cybereason-xdr-for-cloud-workloads www.secnews.physaphae.fr/article.php?IdArticle=4105034 True Ransomware None None CybeReason - Vendor blog Cybereason vs. Lorenz Ransomware Cybereason vs. Lorenz Ransomware Lorenz is a ransomware strain observed first in February of 2021, and is believed to be a rebranding of the “.sZ40” ransomware that was discovered in October 2020. Lorenz targets organizations worldwide with customized attacks demanding hundreds of thousands of dollars, and even millions in ransom fee. ]]> 2022-02-08T18:57:04+00:00 http://www.cybereason.com/blog/cybereason-vs.-lorenz-ransomware www.secnews.physaphae.fr/article.php?IdArticle=4095689 False Ransomware None None CybeReason - Vendor blog Financial Services and the Evolving Ransomware Threat Financial Services and the Evolving Ransomware Threat There's no doubt about it, ransomware attackers are increasingly targeting organizations in the financial services sector. As reported by Berkley Financial Specialists, financial institutions reported 635 ransomware-related events in the first half of 2021. That's a 30% increase over the same from the previous year. ]]> 2022-02-08T14:13:21+00:00 http://www.cybereason.com/blog/financial-services-and-the-evolving-ransomware-threat www.secnews.physaphae.fr/article.php?IdArticle=4094316 False Ransomware,Threat None None CybeReason - Vendor blog Webinar February 24th 2022: Live Attack Simulation - Ransomware Threat Hunter Series Webinar February 24th 2022: Live Attack Simulation - Ransomware Threat Hunter Series Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. ]]> 2022-02-08T10:00:00+00:00 http://www.cybereason.com/blog/webinar-february-24th-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4095691 True Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: Why Aren\'t SMBs Investing in Cybersecurity? Malicious Life Podcast: Why Aren't SMBs Investing in Cybersecurity? Attacks against Small-to-Medium size businesses (SMBs) currently represent roughly 40% to 50% of all data breaches. Josh Ablett, founder and CISO of Adelia Risk, speaks with Nate Nelson about the kind of security he usually finds in SMBs when he's called in to make an initial security assessment - spoiler: not a pretty picture - the impact of data breaches on SMBs, and what role do insurance companies play in improving the state of security in that often overlooked segment of the industry - check it out…]]> 2022-02-07T13:52:48+00:00 http://www.cybereason.com/blog/malicious-life-podcast-why-arent-smbs-investing-in-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=4091160 False None None None CybeReason - Vendor blog Iranian Threat Actors Turn Up Heat on Cyber Cold War Iranian Threat Actors Turn Up Heat on Cyber Cold War Cybereason released new reports this week sharing discoveries made by our researchers related to two different Iranian threat actors. One of the keys to giving Defenders the tools they need to reverse the adversary advantage is understanding how attackers think and the tools they use-which is why research into emerging tactics and techniques is essential. ]]> 2022-02-04T15:18:38+00:00 http://www.cybereason.com/blog/iranian-threat-actors-turn-up-heat-on-cyber-cold-war www.secnews.physaphae.fr/article.php?IdArticle=4081134 False Threat None None CybeReason - Vendor blog Responding to Multi-Endpoint Threats with XDR Responding to Multi-Endpoint Threats with XDR Today's advanced threat actors are capable of gaining access to your network and moving laterally to more sensitive systems in just minutes. Therefore, detection, insight, and speed of response are critical to preventing business disruption, data theft or ransomware.]]> 2022-02-04T11:00:00+00:00 http://www.cybereason.com/blog/responding-to-multi-endpoint-threats-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=4091162 False Threat None None CybeReason - Vendor blog Employee Spotlight: Developing a Unified Security Platform Employee Spotlight: Developing a Unified Security Platform Candidates for engineering roles on our team often ask us whether they need a background in security. The answer is: Definitely not. Many attackers themselves are software engineers, rather than hackers or security experts, and that expertise isn't required to be a Cybereason Defender, either. To help explain why, we asked Team Lead for Anti-Malware and Kernel Engines Dani Koretsky to share an inside look at some of the development work that makes Cybereason possible.]]> 2022-02-03T14:22:04+00:00 http://www.cybereason.com/blog/employee-spotlight-developing-a-unified-security-platform www.secnews.physaphae.fr/article.php?IdArticle=4076511 False Guideline None None CybeReason - Vendor blog CISO Stories Podcast: Do It Internally or Hire a Consultant? CISO Stories Podcast: Do It Internally or Hire a Consultant? With the cybersecurity talent shortage expected to last many years into the future, and a particular skill is needed that is not available within the current team, what do you do? Should you hire someone externally, or bring in a consultant? What are the pitfalls of each approach? John Iatonna, CISO at Spencer Stuart, discusses his experience in making these tough decisions - check it out...]]> 2022-02-03T14:08:35+00:00 http://www.cybereason.com/blog/ciso-stories-podcast-do-it-internally-or-hire-a-consultant www.secnews.physaphae.fr/article.php?IdArticle=4076512 False None None None CybeReason - Vendor blog How Cybereason XDR Supports Zero Trust Initiatives How Cybereason XDR Supports Zero Trust Initiatives The White House last week released the Federal government's strategy to move agencies toward a Zero Trust approach to cybersecurity. The document formalizes the Biden administration's expectations for Zero-Trust architecture at all federal agencies, with deadlines set to meet various objectives by the end of 2024.]]> 2022-02-02T20:31:48+00:00 https://www.cybereason.com/blog/how-cybereason-xdr-supports-zero-trust-initiatives www.secnews.physaphae.fr/article.php?IdArticle=4072776 False None None None CybeReason - Vendor blog Cybereason XDR: Achieving 10X Reduction in False Positives Cybereason XDR: Achieving 10X Reduction in False Positives Security Operations Center teams, regardless of size or sophistication, are at their breaking point. Alert overload and a “Fear of Missing Incidents” have led to unmanageable stress levels for SOC analysts. Making matters worse, more than half of those alerts are false positives - robbing analysts of time they could use on planning, training, and proactively improving their security program.]]> 2022-02-02T14:19:19+00:00 https://www.cybereason.com/blog/cybereason-xdr-achieving-10x-reduction-in-false-positives www.secnews.physaphae.fr/article.php?IdArticle=4071186 False None None None CybeReason - Vendor blog XDR: The Key to Empowering Your SOC XDR: The Key to Empowering Your SOC Some interesting stats published recently  by ITProPortal revealed 55% of technology and security executives said that they intended to increase their cybersecurity budgets by the end of the year. Approximately the same proportion (51%) of respondents revealed that they also planned to increase their number of full-time security professionals in that period.]]> 2022-02-02T14:13:41+00:00 https://www.cybereason.com/blog/xdr-the-key-to-empowering-your-soc www.secnews.physaphae.fr/article.php?IdArticle=4071187 False None None None CybeReason - Vendor blog StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations Over the past months, the Cybereason Nocturnus Team has been tracking the Iranian hacker group known as Moses Staff. The group was first spotted in October 2021 and claims their motivation is to harm Israeli companies by leaking sensitive, stolen data. ]]> 2022-02-01T05:02:00+00:00 https://www.cybereason.com/blog/strifewater-rat-iranian-apt-moses-staff-adds-new-trojan-to-ransomware-operations www.secnews.physaphae.fr/article.php?IdArticle=4063280 False Ransomware None None CybeReason - Vendor blog PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage PowerLess Trojan: Iranian APT Phosphorus Adds New PowerShell Backdoor for Espionage Over the past months, the Cybereason Nocturnus Team observed an uptick in the activity of the Iranian attributed group dubbed Phosphorus (AKA Charming Kitten, APT35), known for previously attacking medical research organizations in the US and Israel in late 2020, and for targeting academic researchers from the US, France, and the Middle East region back in 2019.]]> 2022-02-01T05:01:00+00:00 https://www.cybereason.com/blog/powerless-trojan-iranian-apt-phosphorus-adds-new-powershell-backdoor-for-espionage www.secnews.physaphae.fr/article.php?IdArticle=4063281 False Conference APT 35,APT 35 None CybeReason - Vendor blog Malicious Life Podcast: The Bloody Origins of Israel\'s Cybersecurity Industry Malicious Life Podcast: The Bloody Origins of Israel's Cybersecurity Industry Israel is a small country, yet its cybersecurity industry is exceptionally successful. In this episode, we go back to the Yom Kippur War of 1973 to discover how a national trauma and an intelligence failure paved the way for Israel to become a cybersecurity mini-empire - check it out…]]> 2022-01-31T13:46:14+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-bloody-origins-of-israels-cybersecurity-industry www.secnews.physaphae.fr/article.php?IdArticle=4059283 False None None None CybeReason - Vendor blog CISO Stories Podcast: Designing a Shared Vision with IT and the Business CISO Stories Podcast: Designing a Shared Vision with IT and the Business The locus of control has been slipping away from IT teams (and by default Security teams), and this “challenge” to IT governance has accelerated post-covid with a more distributed workforce. The security implications of this are significant in that security programs are not typically sized nor funded to deal with one technology approach, let alone two. Scott King, CISO at Encore Capital Group joins the podcast to discuss strategies to remain agile in the face of rapid change - check it out...]]> 2022-01-27T14:25:34+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-designing-a-shared-vision-with-it-and-the-business www.secnews.physaphae.fr/article.php?IdArticle=4041451 False None None None CybeReason - Vendor blog Employee Spotlight: On Values and Culture at Cybereason Employee Spotlight: On Values and Culture at Cybereason When Hadar Harari signed on as a senior program manager at Cybereason's Tel Aviv office, she heard a lot about the values of the fast-growing cybersecurity company. And what she heard soon proved to be true. Below, see why Hadar says “the Defender vibe is real; it's in the DNA of the company.”]]> 2022-01-26T14:05:28+00:00 https://www.cybereason.com/blog/employee-spotlight-on-values-and-culture-at-cybereason www.secnews.physaphae.fr/article.php?IdArticle=4036003 False None None None CybeReason - Vendor blog The Fog of Cyberwar The Fog of Cyberwar The temperature is rising in the ongoing Cyber Cold War as tensions increase between Russia and the United States. The US Department of Homeland Security (DHS) issued a warning that Russia may pursue a cyberattack against the US and cautioned government agencies and private companies to be prepared. ]]> 2022-01-25T20:22:25+00:00 https://www.cybereason.com/blog/the-fog-of-cyberwar www.secnews.physaphae.fr/article.php?IdArticle=4031997 False None None None CybeReason - Vendor blog Three Reasons XDR Should Drive Your Security Strategy Three Reasons XDR Should Drive Your Security Strategy A recent SecBI survey found that many organizations are in the process of adopting Extended Detection and Response (XDR). Nearly 80% of infosec personnel who responded to the survey said that XDR should be a top security priority for their organization. ]]> 2022-01-25T12:48:16+00:00 https://www.cybereason.com/blog/three-reasons-xdr-should-drive-your-security-strategy www.secnews.physaphae.fr/article.php?IdArticle=4030112 False None None None CybeReason - Vendor blog The Private Infrastructure Security Renaissance The Private Infrastructure Security Renaissance Although it seems counterintuitive and  a throwback to Enterprise IT setups from nearly a decade ago, private infrastructure is in a Renaissance period. ]]> 2022-01-24T22:43:48+00:00 https://www.cybereason.com/blog/the-private-infrastructure-security-renaissance www.secnews.physaphae.fr/article.php?IdArticle=4028796 False None None None CybeReason - Vendor blog Ten of the Biggest Ransomware Attacks of 2021 Ten of the Biggest Ransomware Attacks of 2021 There were nearly 500 million ransomware attacks in the first half of 2021. As reported by Help Net Security, security researchers detected 190.4 million ransomware attempts in Q3 2021 alone, which brought the total volume of attacks up to 470 million at the beginning of October. The researchers went on to predict that there would be a total of 714 million ransomware attacks by the end of the year, constituting a 134% year-over-year increase from 2020.]]> 2022-01-24T14:05:07+00:00 https://www.cybereason.com/blog/ten-of-the-biggest-ransomware-attacks-of-2021 www.secnews.physaphae.fr/article.php?IdArticle=4026000 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Hacker Highschool Malicious Life Podcast: Hacker Highschool Pete Herzog is a security expert and an educator with a vision: he wants our kids to learn about cybersecurity, and not just about not talking to strangers online - he wants them to learn even more advanced stuff such as security analysis and hacking. Pete spoke with Nate Nelson about his Hacker Highschool initiative, and the lessons he learned from it - check it out…]]> 2022-01-24T14:01:51+00:00 https://www.cybereason.com/blog/malicious-life-podcast-hacker-highschool www.secnews.physaphae.fr/article.php?IdArticle=4026001 False None None None CybeReason - Vendor blog Cybereason XDR: 10X Faster Threat Hunting Cybereason XDR: 10X Faster Threat Hunting For many Security Operations Centers (SOCs), conducting effective queries using a traditional Security Information and Event Management (SIEM) requires training and familiarity with syntax language, and deep analysis to take action on the results of a particular hunt. ]]> 2022-01-20T13:33:58+00:00 https://www.cybereason.com/blog/cybereason-xdr-10x-faster-threat-hunting www.secnews.physaphae.fr/article.php?IdArticle=4003763 False Threat None None CybeReason - Vendor blog CISO Stories Podcast: Moving to the Cloud? Don\'t Forget Hardware Security CISO Stories Podcast: Moving to the Cloud? Don't Forget Hardware Security While the cloud computing infrastructure is designed to be very agile and flexible, transparency as to where the information is being processed is very important due to global privacy and security regulations. Steve Orrin, Federal CTO at Intel, joins the podcast to discuss approaches to remaining compliant with the various laws (i.e., restricting where the data may reside) when moving to the cloud - check it out...]]> 2022-01-20T13:30:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-moving-to-the-cloud-dont-forget-hardware-security www.secnews.physaphae.fr/article.php?IdArticle=4003764 False None None None CybeReason - Vendor blog Five Ransomware Myths that Leave Businesses Vulnerable Five Ransomware Myths that Leave Businesses Vulnerable In June 2021, The Washington Post identified five ransomware myths that could cloud organizations' security strategies. It's been a few months since the list was released, so Let's see how those myths are looking as we launch into Q1 of 2022:]]> 2022-01-19T15:03:25+00:00 https://www.cybereason.com/blog/five-ransomware-myths-that-leave-businesses-vulnerable www.secnews.physaphae.fr/article.php?IdArticle=3996141 False Ransomware None None CybeReason - Vendor blog Evaluating Open XDR vs. Native XDR Evaluating Open XDR vs. Native XDR We've already spoken about the strengths of Extended Detection and Response (XDR) as it relates to other solutions such as EDR, SIEM, and SOAR. But did you know that not all XDR platforms are created equal? ]]> 2022-01-19T14:59:09+00:00 https://www.cybereason.com/blog/evaluating-open-xdr-vs.-native-xdr www.secnews.physaphae.fr/article.php?IdArticle=3996142 False None None None CybeReason - Vendor blog Webinar February 3rd 2022: Live Attack Simulation - Ransomware Threat Hunter Series Webinar February 3rd 2022: Live Attack Simulation - Ransomware Threat Hunter Series Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. ]]> 2022-01-19T10:00:00+00:00 https://www.cybereason.com/blog/webinar-february-3rd-2022-live-attack-simulation-ransomware-threat-hunter-series www.secnews.physaphae.fr/article.php?IdArticle=4003768 True Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: The Mystery of Cicada 3301 Malicious Life Podcast: The Mystery of Cicada 3301 "Hello. We are looking for highly intelligent individuals. To find them, we have devised a test…" These words, found in a message posted on 4Chan in January 2012, started a global treasure hunt, with thousands of crypto-puzzle-loving and curious individuals desperately competing with one another to be the first to crack the devilish puzzles created by the mysterious Cicada 3301. Who is Cicada3301, and what are their goals? Check it out…]]> 2022-01-18T14:18:17+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-mystery-of-cicada-3301 www.secnews.physaphae.fr/article.php?IdArticle=3986932 False None APT 10 None CybeReason - Vendor blog Cybereason Launches  \'Pay As You Grow\' Program to Nurture Managed Security Services Partners Cybereason Launches  'Pay As You Grow' Program to Nurture Managed Security Services Partners Cybereason has launched the 'Pay as you Grow' program (PAYG) for Managed Security Services Providers (MSSPs), which provides the company's most trusted partners and solution providers with financial flexibility to increase their margins and profitability. ]]> 2022-01-18T14:13:12+00:00 https://www.cybereason.com/blog/cybereason-launches-pay-as-you-grow-program-to-nurture-managed-security-services-partners www.secnews.physaphae.fr/article.php?IdArticle=3986933 False None None None CybeReason - Vendor blog New Year, Same Old Microsoft Issues New Year, Same Old Microsoft Issues I appreciate the beginning of a new year–it's like a reset button. January is a fresh, clean slate that kicks off 12 months of possibilities and opportunities. It's a chance to do things differently and be better than the year before. ]]> 2022-01-14T18:14:12+00:00 https://www.cybereason.com/blog/new-year-same-old-microsoft-issues www.secnews.physaphae.fr/article.php?IdArticle=3966373 False None None None