www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:24:36+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog Malicious Life Podcast: Marcus Hutchins - A Controversial Hero Malicious Life Podcast: Marcus Hutchins - A Controversial Hero In May 2017, Marcus Hutchins - AKA MalwareTech - became a hero for stopping WannaCry, a particularly nasty ransomware that spread quickly all over the world. Yet his fame also brought to light his troubled past as the teenage Black Hat hacker who created KRONOS, a dangerous rootkit. Should a criminal-turned-hero be punished for his past crimes? Check it out...]]> 2021-10-25T12:44:44+00:00 https://www.cybereason.com/blog/malicious-life-podcast-marcus-hutchins-a-controversial-hero www.secnews.physaphae.fr/article.php?IdArticle=3559497 False Ransomware Wannacry None CybeReason - Vendor blog Microsoft OneDrive Used for Ransom Operations Microsoft OneDrive Used for Ransom Operations Microsoft was called out recently after it was discovered that hundreds of malware files commonly used to launch Conti ransomware attacks are being hosted from their OneDrive cloud storage service. The news highlights once again that Microsoft needs to invest significant time and resources just to get its own security house in order-and why they have no business trying to sell customers cybersecurity solutions to problems they created. ]]> 2021-10-22T19:31:06+00:00 https://www.cybereason.com/blog/microsoft-onedrive-used-for-ransom-operations www.secnews.physaphae.fr/article.php?IdArticle=3550865 False Ransomware,Malware None None CybeReason - Vendor blog CISO Stories Podcast: NotPetya - 45 Minutes and 10,000 Servers Encrypted CISO Stories Podcast: NotPetya - 45 Minutes and 10,000 Servers Encrypted Learn how to prepare and reduce the risk of the next ransomware event as Todd Inskeep, Founder at Incovate Solutions, walks us through the lessons learned after managing out of a NotPetya ransomware attack. Will you be ready? Don't miss this podcast for valuable insights from a real-life scenario - check it out...]]> 2021-10-21T12:31:48+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-notpetya-45-minutes-and-10000-servers-encrypted www.secnews.physaphae.fr/article.php?IdArticle=3543277 False Ransomware NotPetya,NotPetya None CybeReason - Vendor blog Three Secrets to Ending Ransomware Three Secrets to Ending Ransomware Stopping ransomware isn't easy. If it were, there wouldn't be so many successful attacks out there. According to ThreatPost, there has been a 151% increase in ransomware attacks in the first half of this year compared to the first half of last year, with over 100 different strains in circulation. ]]> 2021-10-20T14:05:27+00:00 https://www.cybereason.com/blog/three-secrets-to-ending-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3537275 False Ransomware None None CybeReason - Vendor blog Why All Telemetry is Essential for XDR Performance Why All Telemetry is Essential for XDR Performance Robust telemetry is essential to any threat detection and response strategy. Organizations need the ability to collect threat information from across their IT infrastructure so that they can see what's going on in their environments and correlate the intelligence across devices, personas, application suites, and the cloud so that it's actionable.]]> 2021-10-20T12:39:41+00:00 https://www.cybereason.com/blog/why-all-telemetry-is-essential-for-xdr-performance www.secnews.physaphae.fr/article.php?IdArticle=3537025 False Threat None None CybeReason - Vendor blog What is the Dark Web Ransomware Marketplace? What is the Dark Web Ransomware Marketplace? Editor's Note: Unlock the knowledge, resources and expert guidance you need to successfully prevent ransomware attacks from impacting your organization's operations with this complimentary Ransomware Toolkit... The theme for Week 3 of Cybersecurity Awareness Month 2021 is “Explore. Experience. Share.” It's also Cybersecurity Career Awareness Week. The purpose of the theme is to highlight all the many contributions that people in cybersecurity roles can make to society through their work.]]> 2021-10-19T13:08:21+00:00 https://www.cybereason.com/blog/what-is-the-dark-web-ransomware-marketplace www.secnews.physaphae.fr/article.php?IdArticle=3531542 False Ransomware None None CybeReason - Vendor blog Cybereason CEO Lior Div Takes Featured Speaker Spot at CNBC Disruptor 50 Summit Cybereason CEO Lior Div Takes Featured Speaker Spot at CNBC Disruptor 50 Summit Global spending on artificial intelligence (AI) systems has nearly tripled since 2019, and it's set to more than double again by the end of 2025, according to IDC. Now's your chance to hear from a pair of market disruptors driving the accelerated adoption of AI's many promising applications, from supercharging software development to stopping ransomware attacks.]]> 2021-10-19T13:07:05+00:00 https://www.cybereason.com/blog/cybereason-ceo-lior-div-takes-featured-speaker-spot-at-cnbc-disruptor-50-summit www.secnews.physaphae.fr/article.php?IdArticle=3531543 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Operation GhostShell - An Iranian Espionage Campaign Malicious Life Podcast: Operation GhostShell - An Iranian Espionage Campaign In July 2021, Nocturnus - the Cybereason Threat Research and Intelligence team - was called to investigate an espionage campaign targeting Aerospace and Telecommunications companies globally. Their investigation resulted in the discovery of a new threat actor dubbed MalKamak that has been operating since at least 2018, and a new and sophisticated RAT (remote access trojan) dubbed ShellClient that abuses Dropbox for C2 (command and control).]]> 2021-10-18T11:52:07+00:00 https://www.cybereason.com/blog/malicious-life-podcast-operation-ghostshell-an-iranian-espionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=3526978 False Threat None None CybeReason - Vendor blog Ransomware: The Global Cybersecurity Pandemic Ransomware: The Global Cybersecurity Pandemic I am sitting in Paris this week at the Les Asis conference, but my mind is also on Biden's ransomware summit as ransomware took center stage again this week. No, not because of a major ransomware attack shutting down critical infrastructure or grinding production to a halt. In fact, the opposite. President Biden continued to push the need for cybersecurity and a more effective response to the scourge of ransomware by convening a 2-day ransomware summit involving 30 countries around the world. ]]> 2021-10-15T00:42:11+00:00 https://www.cybereason.com/blog/ransomware-the-global-cybersecurity-pandemic www.secnews.physaphae.fr/article.php?IdArticle=3517072 False Ransomware None None CybeReason - Vendor blog Microsoft\'s Failure to Prioritize Security Puts Everyone at Risk Microsoft's Failure to Prioritize Security Puts Everyone at Risk It has been a very busy year when it comes to Microsoft zero-day attacks. According to KrebsOnSecurity, May is the only month in 2021 that Microsoft didn't release a patch to defend against at least one zero-day exploit. And Microsoft vulnerabilities are playing a bigger role in the spate of ransomware infections organizations are grappling with than most probably are aware of (more on that below).]]> 2021-10-14T12:50:13+00:00 https://www.cybereason.com/blog/microsofts-failure-to-prioritize-security-puts-everyone-at-risk www.secnews.physaphae.fr/article.php?IdArticle=3513698 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: Security Awareness that Actually Works CISO Stories Podcast: Security Awareness that Actually Works October is Cybersecurity Awareness Month! Security Awareness programs must grab the employee's attention if they are to succeed - Steven Lentz joins the podcast to explain how he successfully engaged the workforce through creative and visible security awareness methods - check it out...]]> 2021-10-14T12:40:21+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-security-awareness-that-actually-works www.secnews.physaphae.fr/article.php?IdArticle=3513699 False None None None CybeReason - Vendor blog Cybereason Recognized in Debut XDR New Wave™ Report Cybereason Recognized in Debut XDR New Wave™ Report As we enter Q4 of a hyper-growth year for XDR, Cybereason is in full gear: We're just getting started! We remain undefeated in protecting our customers from headline-stealing attacks like SolarWinds, the Microsoft Exchange Server attacks, and dangerous ransomware attacks from DarkSide, REvil and other adversaries. ]]> 2021-10-13T13:42:47+00:00 https://www.cybereason.com/blog/cybereason-recognized-in-debut-xdr-new-wave-report www.secnews.physaphae.fr/article.php?IdArticle=3509398 False Ransomware None None CybeReason - Vendor blog What is the Importance of XDR in Cloud Security? What is the Importance of XDR in Cloud Security? Organizations are increasingly turning to hybrid-cloud and multi-cloud strategies as ways of keeping up with their evolving business needs. A majority (92%) of organizations already had a multi-cloud strategy at the start of the year, according to Beta News, while 80% were working with hybrid cloud environments at that time.]]> 2021-10-13T12:06:42+00:00 https://www.cybereason.com/blog/what-is-the-importance-of-xdr-in-cloud-security www.secnews.physaphae.fr/article.php?IdArticle=3509197 False None None None CybeReason - Vendor blog Cybereason and Aon Partner to End Cyber Attacks Cybereason and Aon Partner to End Cyber Attacks Cybereason is partnering with Aon, a leading global professional services firm, in an alliance to help protect clients from sophisticated cyber attacks. The Cybereason Defense Platform, together with Aon's Cyber Solutions, will enable clients to better prevent, detect and respond to cyber threats.]]> 2021-10-13T09:00:00+00:00 https://www.cybereason.com/blog/cybereason-and-aon-partner-to-end-cyber-attacks www.secnews.physaphae.fr/article.php?IdArticle=3507907 False Guideline None None CybeReason - Vendor blog Cybereason and Google Cloud Join Forces to Drive XDR Innovation Cybereason and Google Cloud Join Forces to Drive XDR Innovation Cybersecurity defenders are under unprecedented pressure and attack from nearly every angle and every threat vector. To properly defend businesses, governments, hospitals, financial institutions and our critical infrastructure, security teams are accelerating their move to Extended Detection and Response (XDR). Properly executing and implementing XDR involves cutting-edge innovation, the very latest in detection technology, and most importantly the ability to collect and analyze all event telemetry data at scale. ]]> 2021-10-12T12:00:20+00:00 https://www.cybereason.com/blog/cybereason-and-google-cloud-join-forces-to-drive-xdr-innovation www.secnews.physaphae.fr/article.php?IdArticle=3504651 False Threat None None CybeReason - Vendor blog What is Ransomware-as-a-Service and How Does it Work? What is Ransomware-as-a-Service and How Does it Work? Editor's Note: Unlock the knowledge, resources and expert guidance you need to successfully prevent ransomware attacks from impacting your organization's operations with this complimentary Ransomware Toolkit... Recently, we introduced a blog series where we'll break down some key drivers of the ransomware threat landscape for Cybersecurity Awareness Month (formerly National Cybersecurity Awareness Month). We spent the first week analyzing Initial Access Brokers (IABs). For this week, let's focus on Ransomware-as-a-Service (RaaS). ]]> 2021-10-12T08:00:00+00:00 https://www.cybereason.com/blog/what-is-ransomware-as-a-service-and-how-does-it-work www.secnews.physaphae.fr/article.php?IdArticle=3507909 False Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: Smart TVs - a New Security Battlefield Malicious Life Podcast: Smart TVs - a New Security Battlefield Smart Homes are slowly but surely becoming a part of our everyday lives, and so far it seems that Smart TVs - equipped with microphones, cameras, and an internet connection - are the weakest link. What are the current and potential threats against smart TVs - and is a person's smart home still their castle? Check it out...]]> 2021-10-11T15:07:15+00:00 https://www.cybereason.com/blog/malicious-life-podcast-smart-tvs-a-new-security-battlefield www.secnews.physaphae.fr/article.php?IdArticle=3501210 False None None None CybeReason - Vendor blog Protecting the US Government from Cyber Attacks Protecting the US Government from Cyber Attacks The US government--along with private organizations regardless of size or industry--has been a prime target this year for cyber attacks and cyber espionage. As a dominant economic, political, and military force in the world, US federal agencies are under constant siege from both cybercriminals and nation-state adversaries. This week, we launched a new subsidiary-Cybereason Government, Inc.-to help them defend against these attacks. ]]> 2021-10-08T23:35:47+00:00 https://www.cybereason.com/blog/protecting-the-us-government-from-cyber-attacks www.secnews.physaphae.fr/article.php?IdArticle=3492223 False None None None CybeReason - Vendor blog CISO Stories Podcast: Extending Detection and Response to the Cloud CISO Stories Podcast: Extending Detection and Response to the Cloud Kathy Wang, CISO at Very Good Security, discusses challenges in extending detection and response capabilities to cloud deployments while also ensuring correlations across traditional networks, endpoints, mobile, application suites and user identities.]]> 2021-10-07T12:52:51+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-extending-detection-and-response-to-the-cloud www.secnews.physaphae.fr/article.php?IdArticle=3483015 False None None None CybeReason - Vendor blog Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms Operation GhostShell: Novel RAT Targets Global Aerospace and Telecoms Firms In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. ]]> 2021-10-06T09:59:21+00:00 https://www.cybereason.com/blog/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms www.secnews.physaphae.fr/article.php?IdArticle=3476419 False None None None CybeReason - Vendor blog Webinar: The Future of Endpoint Security Webinar: The Future of Endpoint Security As security threats continue to evolve, our approach to security must also evolve with them. Legacy signature-based antivirus solutions are no longer enough to prevent the highly targeted attacks of today, making traditional solutions an inadequate defense.]]> 2021-10-05T21:36:00+00:00 https://www.cybereason.com/blog/webinar-the-future-of-endpoint-security www.secnews.physaphae.fr/article.php?IdArticle=3483017 True None None None CybeReason - Vendor blog New Cybereason Government Subsidiary Empowers U.S. Agencies to Detect Malicious Operations Faster New Cybereason Government Subsidiary Empowers U.S. Agencies to Detect Malicious Operations Faster Cybereason is excited to announce  the creation of a U.S. Government subsidiary, Cybereason Government Inc., dedicated to prevention, detection and response to malicious operations targeting U.S. Government agencies. Cybereason is committed to supporting government defenders by providing multi-layered protection for continuous monitoring, proactive threat hunting, automated containment and remediation, and immediate incident response capabilities. ]]> 2021-10-05T13:01:28+00:00 https://www.cybereason.com/blog/new-cybereason-government-subsidiary-empowers-u.s.-agencies-to-detect-malicious-operations-faster www.secnews.physaphae.fr/article.php?IdArticle=3470915 False None None None CybeReason - Vendor blog How Do Initial Access Brokers Enable Ransomware Attacks? How Do Initial Access Brokers Enable Ransomware Attacks? Editor's Note: Unlock the knowledge, resources and expert guidance you need to successfully prevent ransomware attacks from impacting your organization's operations with this complimentary Ransomware Toolkit... This October marks the 18th iteration of Cybersecurity Awareness Month, formerly called National Cybersecurity Awareness Month (NCSAM). Together with the National Cyber Security Alliance (NCSA), the U.S. Cybersecurity & Infrastructure Security Agency unveiled Do Your Part. #BeCyberSmart as this year's theme. They also named “Be Cyber Smart” as the focus for the week of October 4 (Cybersecurity Awareness Month Week 1).]]> 2021-10-05T11:50:20+00:00 https://www.cybereason.com/blog/how-do-initial-access-brokers-enable-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3470686 False Ransomware None None CybeReason - Vendor blog Running Robust Managed Detection and Response Services Running Robust Managed Detection and Response Services Information security practitioners have published a lot of articles around topics like how to build and run a security operations center (SOC) and specific SOC functions such as incident response and threat hunting. These topics are always important, as threat actors are constantly coming up with more sophisticated attack strategies and vectors.]]> 2021-10-04T11:59:49+00:00 https://www.cybereason.com/blog/running-robust-managed-detection-and-response-services www.secnews.physaphae.fr/article.php?IdArticle=3464876 False Threat None None CybeReason - Vendor blog Malicious Life Podcast: Inside the MITRE ATT&CK Framework Malicious Life Podcast: Inside the MITRE ATT&CK Framework In some ways, cybersecurity is like art, but that's not a good thing… The MITRE ATT&CK framework aims to make sense of the collective knowledge of the security community and share that knowledge so that cyber defense becomes less an art form and more about using the correct tools and techniques.]]> 2021-10-04T11:57:27+00:00 https://www.cybereason.com/blog/malicious-life-podcast-inside-the-mitre-attck-framework www.secnews.physaphae.fr/article.php?IdArticle=3464877 False None None None CybeReason - Vendor blog If You Prevent Ransomware You Don\'t Need to Recover from It If You Prevent Ransomware You Don't Need to Recover from It I started Cybereason to help defenders protect their networks and data against attacks-to use what I know about how cybercriminals think and how adversaries work to give defenders an advantage against all threats. Right now, one of the most pervasive threats is ransomware, and I am proud to say that we remain undefeated against ransomware attacks. ]]> 2021-10-01T14:36:19+00:00 https://www.cybereason.com/blog/if-you-prevent-ransomware-you-dont-need-to-recover-from-it www.secnews.physaphae.fr/article.php?IdArticle=3452894 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: Security from Scratch - Incident Response on a Budget CISO Stories Podcast: Security from Scratch - Incident Response on a Budget Every organization must be able to respond to an attack quickly. Sam Monasteri joins the podcast to discuss key steps to implement in an incident response plan without breaking the bank by simplifying incident response to the 3 'P's - check it out...]]> 2021-09-30T13:58:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-security-from-scratch-incident-response-on-a-budget www.secnews.physaphae.fr/article.php?IdArticle=3449759 False None None None CybeReason - Vendor blog Govware Conference: Cybereason CEO Lior Div to Deliver Keynote Govware Conference: Cybereason CEO Lior Div to Deliver Keynote Cybereason is pleased to share that our CEO and co-founder Lior Div will be a keynote speaker at the Govware Conference in Singapore on Wednesday, October 6, 9:30 am, SST. His talk will focus on the rise in cyber attacks against global telecommunications companies.  Sam Curry, the company's CSO, will also be speaking on Thursday, October 7, 1:05 pm SST, offering practical advice and recommendations for future proofing a business. ]]> 2021-09-30T13:09:34+00:00 https://www.cybereason.com/blog/govware-conference-cybereason-ceo-lior-div-to-deliver-keynote www.secnews.physaphae.fr/article.php?IdArticle=3449760 False None None None CybeReason - Vendor blog How Does XDR Solve the IT Infrastructure Visibility Gap? How Does XDR Solve the IT Infrastructure Visibility Gap? Network visibility is a persistent problem for organizations. Back in 2019, Business Wire shared the results of a survey in which 65% of respondents said that a lack of visibility into their organizations' IT security infrastructure was the top obstacle to the success of their Security Operations Center (SOC). Approximately the same proportion (69%) named a lack of visibility as the top reason behind their SOC's ineffectiveness. ]]> 2021-09-29T12:55:19+00:00 https://www.cybereason.com/blog/how-does-xdr-solve-the-it-infrastructure-visibility-gap www.secnews.physaphae.fr/article.php?IdArticle=3443351 False None None None CybeReason - Vendor blog Ransomware Prevention vs. Recovery: Which Costs Businesses More? Ransomware Prevention vs. Recovery: Which Costs Businesses More? It probably comes as no surprise that ransomware attacks are more prolific now than they were several years ago. A 2021 survey found that ransomware attacks increased 62% over the preceding two years, as reported by Security Magazine, with North American registering a surge of 158% during that same period.]]> 2021-09-28T12:40:35+00:00 https://www.cybereason.com/blog/ransomware-prevention-vs.-recovery-which-costs-businesses-more www.secnews.physaphae.fr/article.php?IdArticle=3437970 False Ransomware None None CybeReason - Vendor blog Threat Analysis Report: Inside the Destructive PYSA Ransomware Threat Analysis Report: Inside the Destructive PYSA Ransomware The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]> 2021-09-27T17:05:50+00:00 https://www.cybereason.com/blog/threat-analysis-report-inside-the-destructive-pysa-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3434386 True Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: Should the U.S. Ban Chinese and Russian Technology? Malicious Life Podcast: Should the U.S. Ban Chinese and Russian Technology? Every year, seemingly, there's a new story of some software like 'Tik Tok' or 'FaceApp' from a hostile country that may or may not be a security threat to us in the West. So what should be done in cases like this? What if the U.S. just banned all technology from Russia and China? Is it a good idea? Is it even possible? Ira Winkler joins the discussion - check it out...]]> 2021-09-27T12:03:13+00:00 https://www.cybereason.com/blog/malicious-life-podcast-should-the-u.s.-ban-chinese-and-russian-technology www.secnews.physaphae.fr/article.php?IdArticle=3432870 False Threat None None CybeReason - Vendor blog Video: The CIO\'s Role in Establishing a Cyber Resilience Strategy Video: The CIO's Role in Establishing a Cyber Resilience Strategy Oracle CIO Jae Evans recently hosted a special edition of CIO Exchange featuring an array of internationally acclaimed speakers who shared their insights on the latest trends in global and internal cyber threats and the strategies required for prevention, detection and response.]]> 2021-09-27T09:30:00+00:00 https://www.cybereason.com/blog/video-the-cios-role-in-establishing-a-cyber-resilience-strategy www.secnews.physaphae.fr/article.php?IdArticle=3434388 False None None None CybeReason - Vendor blog 1,460-Day Old Known Vulnerability Catches Microsoft Off Guard 1,460-Day Old Known Vulnerability Catches Microsoft Off Guard Vulnerabilities are a fact of life. I started my career in cybersecurity finding and exploiting those vulnerabilities to conduct nation-state offensive operations. I understand the simple reality that there is no such thing as perfect code, and that even the most secure application can be compromised given enough time. But that is not an excuse for writing bad code or failing to address known issues. ]]> 2021-09-24T12:33:29+00:00 https://www.cybereason.com/blog/1460-day-old-known-vulnerability-catches-microsoft-off-guard www.secnews.physaphae.fr/article.php?IdArticle=3423099 False Vulnerability None None CybeReason - Vendor blog CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them.]]> 2021-09-23T12:55:14+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-fiscally-responsible-ways-to-train-and-build-community www.secnews.physaphae.fr/article.php?IdArticle=3416949 False None None None CybeReason - Vendor blog Threat Analysis Report: PrintNightmare and Magniber Ransomware Threat Analysis Report: PrintNightmare and Magniber Ransomware The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.]]> 2021-09-22T17:26:23+00:00 https://www.cybereason.com/blog/threat-analysis-report-printnightmare-and-magniber-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3413317 False Ransomware,Threat None None CybeReason - Vendor blog How XDR is Changing Security for the Better How XDR is Changing Security for the Better The future of XDR (Extended Detection and Response) looks bright. As reported by MarketResearch.com, analyst firm Frost & Sullivan predicts that the global XDR market will grow by triple digits in the coming years. This optimistic prediction reflects the many benefits that XDR brings to organizations and their ongoing security efforts - we discuss four of those advantages below. ]]> 2021-09-22T12:59:45+00:00 https://www.cybereason.com/blog/how-xdr-is-changing-security-for-the-better www.secnews.physaphae.fr/article.php?IdArticle=3411406 False None None None CybeReason - Vendor blog Cybereason Partners with Sysware to Secure Indonesian Companies Cybereason Partners with Sysware to Secure Indonesian Companies Cybereason Is partnering with Sysware, a leading software distributor in Indonesia, to protect Indonesian companies from sophisticated cyber attacks on endpoints and across their networks.]]> 2021-09-22T12:00:00+00:00 https://www.cybereason.com/blog/cybereason-partners-with-sysware-to-secure-indonesian-companies www.secnews.physaphae.fr/article.php?IdArticle=3413319 False Guideline None None CybeReason - Vendor blog How the Ransomware Gangs Stay One Step Ahead How the Ransomware Gangs Stay One Step Ahead Ransomware attacks increased dramatically in the first half of 2021. As reported by ITProPortal, the volume of global ransomware hit 304.7 million during that six-month period. That's 0.1 million more ransomware attacks than the entire total in 2020.]]> 2021-09-21T12:17:42+00:00 https://www.cybereason.com/blog/how-the-ransomware-gangs-stay-one-step-ahead www.secnews.physaphae.fr/article.php?IdArticle=3405825 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Jack Rhysider and the Darknet Diaries Malicious Life Podcast: Jack Rhysider and the Darknet Diaries Jack Rhysider's show Darknet Diaries is the most popular cybersecurity podcast around - and one of the most successful tech podcasts in the US in general. We spoke with Jack about the origins of Darknet Diaries, his heroes and role models, and the effect the show's success has had on his personal life - which you might be surprised to discover wasn't always 100% positive - check it out...]]> 2021-09-20T12:39:11+00:00 https://www.cybereason.com/blog/malicious-life-podcast-jack-rhysider-and-the-darknet-diaries www.secnews.physaphae.fr/article.php?IdArticle=3399737 False None None None CybeReason - Vendor blog Webinar: Inside the REvil Ransomware - Pick Your Path Webinar: Inside the REvil Ransomware - Pick Your Path Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business.]]> 2021-09-20T12:15:31+00:00 https://www.cybereason.com/blog/webinar-inside-the-revil-ransomware-pick-your-path www.secnews.physaphae.fr/article.php?IdArticle=3399738 True Ransomware None None CybeReason - Vendor blog Grief Gang\'s New Quadruple Extortion Scheme Doesn\'t Change the Game Grief Gang's New Quadruple Extortion Scheme Doesn't Change the Game Imagine heading to work on a Monday morning. You stop at Starbucks on the way in for a little caffeine jumpstart. Traffic was bad-as usual, but you've seen worse. You sit down at your desk and bring your computer to life and find a message on the display letting you know your systems have been encrypted with ransomware. What do you do? ]]> 2021-09-17T22:47:27+00:00 https://www.cybereason.com/blog/grief-gangs-new-quadruple-extortion-scheme-doesnt-change-the-game www.secnews.physaphae.fr/article.php?IdArticle=3387788 False None None None CybeReason - Vendor blog CISO Stories Podcast: Communications Before, During and After a Breach CISO Stories Podcast: Communications Before, During and After a Breach Figuring out what to do after a breach is the wrong time to start the planning process. Communications strategies must be in place well beforehand and there are many benefits to the cybersecurity program for implementing these strategies in advance.]]> 2021-09-16T12:56:24+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-communications-before-during-and-after-a-breach www.secnews.physaphae.fr/article.php?IdArticle=3377649 False None None None CybeReason - Vendor blog Four Considerations for Evaluating XDR Platforms Four Considerations for Evaluating XDR Platforms There's a growing need for the more holistic approach to threat detection and response that XDR can deliver. Why? Just look at what's going on in the digital threat landscape...]]> 2021-09-15T12:46:32+00:00 https://www.cybereason.com/blog/four-considerations-for-evaluating-xdr-platforms www.secnews.physaphae.fr/article.php?IdArticle=3371888 False Threat None None CybeReason - Vendor blog Three Pillars of Infosec: Confidentiality, Integrity and Availability Three Pillars of Infosec: Confidentiality, Integrity and Availability Resurgent data breaches that can be tied back to a failure to adhere to basic infosec principles have been an unpleasant surprise in a world of modern security frameworks and maturing processes, but they serve as a useful reminder to us all that there is immense value in mastering the basics.]]> 2021-09-15T12:45:40+00:00 https://www.cybereason.com/blog/three-pillars-of-infosec-confidentiality-integrity-and-availability www.secnews.physaphae.fr/article.php?IdArticle=3371889 False None None None CybeReason - Vendor blog Update Your Apple Devices to Guard Against Pegasus Spyware Attacks Update Your Apple Devices to Guard Against Pegasus Spyware Attacks Apple issued an emergency update yesterday for a critical vulnerability discovered in its iPhones, Apple Watches, and Mac computers. Researchers at Citizen Lab discovered a no-click zero-day exploit that works on all Apple devices that do not have the latest update. ]]> 2021-09-14T20:07:22+00:00 https://www.cybereason.com/blog/update-your-apple-devices-to-guard-against-pegasus-spyware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3370466 False Vulnerability None None CybeReason - Vendor blog What is Driving the Surge of Ransomware Attacks? What is Driving the Surge of Ransomware Attacks? Some major ransomware attacks have dominated the headlines recently. Back in the beginning of May, for instance, the Colonial Pipeline Company suspended its daily transportation of 100 million gallons of fuel between Houston, Texas and New York Harbor following an infection at the hands of the DarkSide ransomware gang. The ensuing disruption caused fuel shortages as well as panic buying of gas along the East Coast.]]> 2021-09-14T12:57:03+00:00 https://www.cybereason.com/blog/what-is-driving-the-surge-of-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3370467 False Ransomware None None CybeReason - Vendor blog Azurescape Vulnerability: More Evidence that  Microsoft Should Leave Security to the Experts Azurescape Vulnerability: More Evidence that  Microsoft Should Leave Security to the Experts It's been a busy couple weeks for Microsoft-and not in a good way. Following the news that a configuration error left Azure cloud customer data exposed to potential compromise, and a security alert from Microsoft about an active exploit targeting a zero-day vulnerability in MSHTML, now there are reports of a critical security vulnerability that can allow attackers to compromise containers in Azure as well. ]]> 2021-09-13T12:56:00+00:00 https://www.cybereason.com/blog/azurescape-vulnerability-more-evidence-that-microsoft-should-leave-security-to-the-experts www.secnews.physaphae.fr/article.php?IdArticle=3368199 False Vulnerability Uber None CybeReason - Vendor blog Malicious Life Podcast: The Tesla Hack Malicious Life Podcast: The Tesla Hack It's every company's nightmare: a mysterious stranger approached an employee of Tesla's Gigafactory in Nevada, and offered him 1 million dollars to do a very simple job - insert a malware-laden USB flash drive into a computer in the company and keep it running for 8 hours - check it out... ]]> 2021-09-13T12:48:26+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-tesla-hack www.secnews.physaphae.fr/article.php?IdArticle=3368200 False Hack None None CybeReason - Vendor blog Gartner Report: 2021 Competitive Landscape for Endpoint Protection Platforms Gartner Report: 2021 Competitive Landscape for Endpoint Protection Platforms The endpoint security landscape continues to evolve with buyers pursuing a vendor and agent consolidation strategy and moving away from best-of-breed solutions. Vendors are leveraging buyer sentiment by expanding portfolios and bundling offerings, while adding new offerings in EDR, XDR and MDR.]]> 2021-09-13T12:39:19+00:00 https://www.cybereason.com/blog/gartner-report-2021-competitive-landscape-for-endpoint-protection-platforms www.secnews.physaphae.fr/article.php?IdArticle=3368201 False None None None CybeReason - Vendor blog Microsoft Zero-Day-of-the-Month Club Microsoft Zero-Day-of-the-Month Club When it comes to zero day attacks against Microsoft products, I often feel like Bill Murray's character in the movie Groundhog Day. It seems like I keep waking up to the same scenario over and over and over, with attackers repeatedly exploiting zero-day vulnerabilities against Microsoft products. ]]> 2021-09-10T18:05:03+00:00 https://www.cybereason.com/blog/microsoft-zero-day-of-the-month-club www.secnews.physaphae.fr/article.php?IdArticle=3361353 False None None None CybeReason - Vendor blog THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them.]]> 2021-09-10T16:00:00+00:00 https://www.cybereason.com/blog/threat-alert-microsoft-mshtml-remote-code-execution-vulnerability www.secnews.physaphae.fr/article.php?IdArticle=3368203 False Vulnerability,Threat None None CybeReason - Vendor blog UN Breach Highlights Escalation of Cyber Threats UN Breach Highlights Escalation of Cyber Threats Hackers have been inside the United Nations network for months. According to a report from Bloomberg, stolen credentials of a UN employee were sold on the Dark Web for as little as $1,000. The report claims that Russian-speaking cybercriminals sold access to the UN systems for months-from April through August of 2021.]]> 2021-09-09T19:56:50+00:00 https://www.cybereason.com/blog/un-breach-highlights-escalation-of-cyber-threats www.secnews.physaphae.fr/article.php?IdArticle=3357898 False None None None CybeReason - Vendor blog CISO Stories Podcast: The Unpatchable Vulnerability that is Human Nature CISO Stories Podcast: The Unpatchable Vulnerability that is Human Nature Rachel Tobac, CEO of SocialProof Security, delves into the inner-workings of social engineering exploits where she leverages her background in neuroscience and behavioral psychology to exploit the unpatchable vulnerability that is human nature - check it out...]]> 2021-09-09T12:46:23+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-the-unpatchable-vulnerability-that-is-human-nature www.secnews.physaphae.fr/article.php?IdArticle=3357899 False Vulnerability None None CybeReason - Vendor blog Ransomware Attackers Don\'t Take Holidays Ransomware Attackers Don't Take Holidays Not everyone took time off for Labor Day weekend. While millions of Americans enjoyed an extended weekend in honor of the holiday, cybercriminals were busy targeting Howard University with a ransomware attack.]]> 2021-09-08T16:18:23+00:00 https://www.cybereason.com/blog/ransomware-attackers-dont-take-holidays www.secnews.physaphae.fr/article.php?IdArticle=3352533 False Ransomware None None CybeReason - Vendor blog Cybereason\'s Lodrina Cherne Joins Panel on Building a More Inclusive Future in Cybersecurity Cybereason's Lodrina Cherne Joins Panel on Building a More Inclusive Future in Cybersecurity Cybereason's Lodrina Cherne, Principal Security Advocate in the Office of the CSO and Aspen Tech Policy Hub Fellow, will join other cyber experts in a discussion on inclusiveness sponsored by the Aspen Tech Policy Hub and Aspen Digital. ]]> 2021-09-08T13:30:00+00:00 https://www.cybereason.com/blog/cybereasons-lodrina-cherne-joins-panel-on-building-a-more-inclusive-future-in-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=3357901 False None None None CybeReason - Vendor blog Cybereason and Smarttech247 Partner to Deliver Managed Detection and Response Cybereason and Smarttech247 Partner to Deliver Managed Detection and Response Businesses today face a constant barrage of cyber threats, including destructive ransomware attacks and other malicious activity. That's why Cybereason is joining forces with Smarttech247, a multi-award-winning MDR company, to defend joint customers through managed detection and response services that block cyber attacks on endpoints anywhere on their networks. ]]> 2021-09-08T13:00:00+00:00 https://www.cybereason.com/blog/cybereason-and-smarttech247-partner-to-deliver-managed-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=3357902 False Ransomware None None CybeReason - Vendor blog Busted: Taking Down Ransomware Attackers Busted: Taking Down Ransomware Attackers Ransomware has been big news this year. In March, the REvil/Sodinokibi ransomware gang infected Acer and demanded $50 million-the highest ransom demand from any ransomware group up to that point. That same gang then turned around a month later and demanded the same ransom from Apple after it failed to coerce Quanta Computer, one of the tech giant's business partners, into paying up.]]> 2021-09-08T12:36:01+00:00 https://www.cybereason.com/blog/busted-taking-down-ransomware-attackers www.secnews.physaphae.fr/article.php?IdArticle=3351673 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Understanding China\'s Cyber Culture Malicious Life Podcast: Understanding China's Cyber Culture Lt. Colonel (Ret.) Bill Hagestad examines how China's culture and troubled history of western colonialism influenced its government views and actions regarding the global internet and its interactions with western technology companies such as Google and Nortel - check it out...]]> 2021-09-07T12:15:05+00:00 https://www.cybereason.com/blog/malicious-life-podcast-understanding-chinas-cyber-culture www.secnews.physaphae.fr/article.php?IdArticle=3346897 False None None None CybeReason - Vendor blog Microsoft Vulnerability Exposes Thousands to Risk…Again Microsoft Vulnerability Exposes Thousands to Risk…Again I can't deny that Microsoft competes with Cybereason, but the truth is, I owe a lot of the success of Cybereason to Microsoft. After all, the lion's share of what we do as defenders is protect against exploits targeting vulnerable Microsoft platforms and applications. ]]> 2021-09-02T21:22:38+00:00 https://www.cybereason.com/blog/microsoft-vulnerability-exposes-thousands-to-risk-again www.secnews.physaphae.fr/article.php?IdArticle=3327804 False Vulnerability None None CybeReason - Vendor blog Cybersecurity Is National Security Cybersecurity Is National Security President Biden convened a meeting at the White House last week to focus on cybersecurity. After months of escalating cyber attacks that have affected critical infrastructure providers, the food supply chain, and even disrupted distribution of COVID-19 vaccines and hospitals at capacity struggling to treat COVID patients, it is time to draw a line in the sand. One thing that is increasingly evident as the lines have blurred for cyber attacks is that cybersecurity is national security. ]]> 2021-09-02T20:46:00+00:00 https://www.cybereason.com/blog/cybersecurity-is-national-security www.secnews.physaphae.fr/article.php?IdArticle=3327659 False None None None CybeReason - Vendor blog CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget? CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget? It seems CISOs are typically lamenting that the security budgets are insufficient. While this can represent a significant problem in achieving information security goals, what happens when you get the funding you asked for and are asked to spend it in less time than expected?]]> 2021-09-02T13:04:13+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-did-you-ask-for-and-get-too-much-security-budget www.secnews.physaphae.fr/article.php?IdArticle=3325223 False None None None CybeReason - Vendor blog The Value Drivers for an XDR Investment The Value Drivers for an XDR Investment We have a pretty good idea by now of what Extended Detection and Response (XDR) is. As we noted in an earlier article, titled XDR: The Next Step in Threat Detection and Response, XDR is a security approach that builds on the successes of Endpoint Detection and Response (EDR).]]> 2021-09-01T13:02:03+00:00 https://www.cybereason.com/blog/the-value-drivers-for-an-xdr-investment www.secnews.physaphae.fr/article.php?IdArticle=3320343 False Threat None None CybeReason - Vendor blog ESG Research Report: 2021 Trends in Endpoint Security ESG Research Report: 2021 Trends in Endpoint Security As security threats quickly continue to evolve, our approaches to security must evolve as well. Simple signature-based antivirus solutions are no longer enough to prevent the highly targeted attacks of today, making traditional solutions an inadequate defense.]]> 2021-08-31T13:35:38+00:00 https://www.cybereason.com/blog/esg-research-report-2021-trends-in-endpoint-security www.secnews.physaphae.fr/article.php?IdArticle=3315495 False None None None CybeReason - Vendor blog Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks The attention generated by the DarkSide ransomware attack against Colonial Pipeline in May has helped to reshape the ransomware threat landscape. One of the most important modifications came when the digital crime forum XSS announced that members could no longer post about ransomware topics. The Exploit forum followed suit not long after, as reported by Bleeping Computer.]]> 2021-08-31T12:01:26+00:00 https://www.cybereason.com/blog/evolving-ransomware-tactics-include-recruiting-insiders-and-ddos-attacks www.secnews.physaphae.fr/article.php?IdArticle=3314865 False Ransomware,Threat None None CybeReason - Vendor blog Malicious Life Podcast: The Life and Times of John McAfee Malicious Life Podcast: The Life and Times of John McAfee What do you get when you take a gun-toting cybersecurity pioneer and add some drugs and a serious amount of money to the mix? You get a life so bizarre, so unbelievably extreme that people will tell your story long after you're long gone. It's all part of John McAfee's unbelievable life and times - check it out...]]> 2021-08-30T12:44:17+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-times-of-john-mcafee www.secnews.physaphae.fr/article.php?IdArticle=3310717 False None None None CybeReason - Vendor blog Afghanistan, the Taliban and National Security Afghanistan, the Taliban and National Security The United States may have left classified or sensitive intelligence behind as US forces withdrew and evacuated from Afghanistan. That information might now be in the hands of the Taliban. There was also a report this week about an alleged cyber breach at the US State Department. These are both concerns with potential implications for national security, but there is no need to panic. ]]> 2021-08-26T20:21:25+00:00 https://www.cybereason.com/blog/afghanistan-the-taliban-and-national-security www.secnews.physaphae.fr/article.php?IdArticle=3292150 False None None None CybeReason - Vendor blog CISO Stories Podcast: Practical Considerations for Managing Your MSSP CISO Stories Podcast: Practical Considerations for Managing Your MSSP For many organizations, large and small, it would be impractical to “skill up” to manage all aspects of cybersecurity. Managed Security Service Providers (MSSPs) provide many different services.]]> 2021-08-26T12:42:47+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-practical-considerations-for-managing-your-mssp www.secnews.physaphae.fr/article.php?IdArticle=3288146 False None None None CybeReason - Vendor blog How XDR Delivers on SOAR\'s Unfulfilled Promises How XDR Delivers on SOAR's Unfulfilled Promises Security Orchestration, Automation, and Response (SOAR) is on the rise. According to MarketsandMarkets, the SOAR market is expected to increase from $868 million in 2019 to $1.791 million by 2024. Such growth would occur at a CAGR of 15.6% in that period - but are organizations getting the value out of SOAR they anticipated? ]]> 2021-08-25T13:09:12+00:00 https://www.cybereason.com/blog/how-xdr-delivers-on-soars-unfulfilled-promises www.secnews.physaphae.fr/article.php?IdArticle=3281378 False None None None CybeReason - Vendor blog Implications of the Alleged State Department Breach Implications of the Alleged State Department Breach The US State Department was reportedly hit by another cyber attack, although it has not been officially confirmed. Whether or not the attack occurred, it is a simple fact that government agencies and private organizations are under constant siege, and that the security professionals tasked with protecting against attacks need to remain vigilant. ]]> 2021-08-24T19:43:41+00:00 https://www.cybereason.com/blog/implications-of-the-alleged-state-department-breach www.secnews.physaphae.fr/article.php?IdArticle=3276749 False None None None CybeReason - Vendor blog Cybereason vs. LockBit2.0 Ransomware Cybereason vs. LockBit2.0 Ransomware The Cybereason Nocturnus team has been tracking the LockBit ransomware since it first emerged in September 2019 as a ransomware-as-a-service (RaaS). Following the rise of the new LockBit2.0 and the latest events, including the attack against the global IT company Accenture, we wanted to provide more information about the attack and show how the Cybereason Defense Platform protects customers from this threat.]]> 2021-08-24T11:55:10+00:00 https://www.cybereason.com/blog/cybereason-vs.-lockbit2.0-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3274373 False Ransomware None None CybeReason - Vendor blog Webinar: Extended Detection and Response (XDR) - Past, Present and Future Webinar: Extended Detection and Response (XDR) - Past, Present and Future If you've been feeling critical about your company's ability to identify and defeat modern attacks, you're not alone. Our world is one where IT infrastructure, attacker trends, and workspace norms continue to shift, so it's an increasingly difficult challenge to build a resilient infosec program backed by tested best practices.]]> 2021-08-23T16:23:21+00:00 https://www.cybereason.com/blog/webinar-extended-detection-and-response-xdr-past-present-and-future www.secnews.physaphae.fr/article.php?IdArticle=3270764 False None None None CybeReason - Vendor blog Malicious Life Podcast: Ten Years On - Are We Doing Security Right? Malicious Life Podcast: Ten Years On - Are We Doing Security Right? The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data. It was March of 2011, and security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecurID product.]]> 2021-08-23T12:01:58+00:00 https://www.cybereason.com/blog/malicious-life-podcast-ten-years-on-are-we-doing-security-right www.secnews.physaphae.fr/article.php?IdArticle=3269337 True Guideline None None CybeReason - Vendor blog T-Mobile and BlackBerry: More Lessons Learned the Hard Way T-Mobile and BlackBerry: More Lessons Learned the Hard Way We learned this week that T-Mobile was the victim of a data breach that exposed data from tens of millions of customers, and then we found out that there is a flaw in BlackBerry's QNX operating system that puts hundreds of millions of devices at risk. These events don't impact everyone, but there are still lessons to be learned. ]]> 2021-08-19T19:20:13+00:00 https://www.cybereason.com/blog/t-mobile-and-blackberry-more-lessons-learned-the-hard-way www.secnews.physaphae.fr/article.php?IdArticle=3256449 False None None None CybeReason - Vendor blog CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture We need the organization to support the cybersecurity initiatives and thus we try to influence the organization to support these goals for the protection of the organizational assets. If we are failing, is it that the organization did not 'get it' or was it our approach? David Nolan, Vice President of Information Security at Aaron's, joins this podcast to discuss how to achieve that consensus - check it out...]]> 2021-08-19T13:00:27+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-achieving-security-buy-in-change-approach-not-culture www.secnews.physaphae.fr/article.php?IdArticle=3254601 False None None None CybeReason - Vendor blog BlackBerry QNX Vulnerability Highlights Lurking Issues with IOT Security BlackBerry QNX Vulnerability Highlights Lurking Issues with IOT Security BlackBerry revealed that its QNX operating system is vulnerable to the BadAlloc flaw revealed earlier this year. QNX is an embedded systems operating system that can be found in hundreds of millions of cars, as well as everything from critical infrastructure, to hospital devices, to equipment on the International Space Station. The disclosure highlights a lurking issue illustrating the much larger challenge we face when it comes to securing internet-of-things (IoT) and embedded systems like QNX.]]> 2021-08-18T16:43:59+00:00 https://www.cybereason.com/blog/blackberry-qnx-vulnerability-highlights-lurking-issues-with-iot-security www.secnews.physaphae.fr/article.php?IdArticle=3249876 False Vulnerability None None CybeReason - Vendor blog Three Reasons Why You Should Never Pay Ransomware Attackers Three Reasons Why You Should Never Pay Ransomware Attackers After falling prey to a ransomware attack, most organizations are faced with the decision of whether they're going to pay the ransom demand. We'll save you some time: it's not worth it, and here are three of the many reasons why it does not pay to pay.]]> 2021-08-18T13:23:46+00:00 https://www.cybereason.com/blog/three-reasons-why-you-should-never-pay-ransomware-attackers www.secnews.physaphae.fr/article.php?IdArticle=3249003 False Ransomware None None CybeReason - Vendor blog Analyst Report: How to Prepare for Ransomware Attacks Analyst Report: How to Prepare for Ransomware Attacks Ransomware operations have evolved dramatically in recent months and years, and now leverage advanced tactics to infiltrate an organization. Security and risk management leaders need to look beyond just the endpoints to help protect the organization from ransomware. Fine-tuning incident response processes to specifically deal with ransomware is a key component for successful mitigation of these multi-stage attacks.]]> 2021-08-17T19:07:26+00:00 https://www.cybereason.com/blog/analyst-report-how-to-prepare-for-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3244480 False Ransomware,Guideline None None CybeReason - Vendor blog T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge Reports came out this week that T-Mobile had suffered a data breach. T-Mobile claims that the leak has been sealed. They deserve credit for responding quickly, but for some the damage may already be done. The data itself may not pose a direct risk to anyone, but the more information cybercriminals can obtain and correlate, the more effective future attacks will be. ]]> 2021-08-17T17:51:52+00:00 https://www.cybereason.com/blog/t-mobile-data-breach-amplifies-larger-cybersecurity-challenge www.secnews.physaphae.fr/article.php?IdArticle=3243824 False Data Breach None None CybeReason - Vendor blog XDR: The Key to Solving SIEM Shortcomings XDR: The Key to Solving SIEM Shortcomings One of the mainstays of organizations' digital security postures is a Security Information and Event Management (SIEM) platform. According to CSO Online, SIEMs augment threat monitoring and incident response with log analysis.]]> 2021-08-17T12:51:03+00:00 https://www.cybereason.com/blog/xdr-the-key-to-solving-siem-shortcomings www.secnews.physaphae.fr/article.php?IdArticle=3242374 False Threat None None CybeReason - Vendor blog Malicious Life Podcast: DeadRinger - Exposing Chinese APTs Targeting Major Telcos Malicious Life Podcast: DeadRinger - Exposing Chinese APTs Targeting Major Telcos Cybereason recently discovered several previously unidentified attack campaigns targeting the telecoms industry across Southeast Asia that are assessed to be the work of multiple Chinese APT groups. The attacks are detailed in the threat intelligence report titled DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos.]]> 2021-08-16T12:04:08+00:00 https://www.cybereason.com/blog/malicious-life-podcast-deadringer-exposing-chinese-apts-targeting-major-telcos www.secnews.physaphae.fr/article.php?IdArticle=3236072 True Threat None None CybeReason - Vendor blog LockBit Ransomware Wants to Hire Your Employees LockBit Ransomware Wants to Hire Your Employees If I offer you a million dollars right now, would you betray your company and help me compromise their data? What if I told you that there is a ransomware group out there that is doing just that? Would you take the bait? Are you sure that others in your company won't be motivated to take that deal? ]]> 2021-08-12T17:03:00+00:00 https://www.cybereason.com/blog/lockbit-ransomware-wants-to-hire-your-employees www.secnews.physaphae.fr/article.php?IdArticle=3217720 False Ransomware None None CybeReason - Vendor blog Accenture Responds Following LockBit Ransomware Attack Accenture Responds Following LockBit Ransomware Attack Global IT consultancy company Accenture announced that it has fully restored its systems after experiencing a LockBit ransomware attack. On August 11, Accenture shared details about an incident involving some of their IT assets.]]> 2021-08-12T14:02:11+00:00 https://www.cybereason.com/blog/accenture-responds-following-lockbit-ransomware-attack www.secnews.physaphae.fr/article.php?IdArticle=3217021 False Ransomware None None CybeReason - Vendor blog The Rising Threat from LockBit Ransomware The Rising Threat from LockBit Ransomware LockBit ransomware is the latest threat posing an increased risk for organizations. The ransomware gang has been making headlines recently. LockBit has also reportedly compromised Accenture. The group reportedly revealed the attack on their site on the DarkWeb, noting, “these people are beyond privacy and security. Hope their services are better than what I have seen inside. If you are interested in purchasing data sets, contact us.”]]> 2021-08-11T14:45:48+00:00 https://www.cybereason.com/blog/rising-threat-from-lockbit-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3211511 False Ransomware,Threat None None CybeReason - Vendor blog CISO Stories Podcast: Hacking Your Way Into Cybersecurity CISO Stories Podcast: Hacking Your Way Into Cybersecurity Kerissa Varma is Group Chief Information Security Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent. Kerissa joins the show to discuss the cybersecurity skills shortage and her initiative to recruit brilliant minds from across an array of fields who have skill sets applicable to cybersecurity, but they might not even know it - check it out...]]> 2021-08-11T12:47:11+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-hacking-your-way-into-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=3210782 False None None None CybeReason - Vendor blog Webinar: REvil Ransomware - Pick Your Path Webinar: REvil Ransomware - Pick Your Path Today's ransomware actors are operating to devastating effect as evidenced by the Colonial Pipeline and JBS attacks, showing that a successful attack can disrupt any business.]]> 2021-08-10T18:17:00+00:00 https://www.cybereason.com/blog/webinar-revil-ransomware-pick-your-path www.secnews.physaphae.fr/article.php?IdArticle=3244488 False Ransomware None None CybeReason - Vendor blog Who Are the Main Targets of Ransomware Attacks? Who Are the Main Targets of Ransomware Attacks? In our ransomware report, titled Ransomware: The True Cost to Business, 81% of respondents indicated that they are highly or very concerned about the risk of ransomware attacks. That's not a surprise given the growing ransomware threat.]]> 2021-08-10T12:56:59+00:00 https://www.cybereason.com/blog/who-are-the-main-targets-of-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3204175 False Ransomware None None CybeReason - Vendor blog XDR: The Next Step in Threat Detection and Response XDR: The Next Step in Threat Detection and Response The global EDR market (Endpoint Detection and Response) is growing rapidly. The Transparency Market Research team predicted that this market will increase at a CAGR of about 21% in the next decade, reported Help Net Security. If it happens, this growth will help the global EDR market surpass a valuation of $13.8 billion by 2030.]]> 2021-08-09T12:18:15+00:00 https://www.cybereason.com/blog/xdr-the-next-step-in-threat-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=3199252 False Threat None None CybeReason - Vendor blog Malicious Life Podcast: The Jester - Hacktivist for Good Malicious Life Podcast: The Jester - Hacktivist for Good The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets he considers to be “the bad guys.” But detractors have insinuated that some of the Jester's operations were little more than internet sleight-of-hand. So, who is The Jester and what can we make of his reported exploits? Check it out…]]> 2021-08-09T12:04:26+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-jester-hacktivist-for-good www.secnews.physaphae.fr/article.php?IdArticle=3198705 False None None None CybeReason - Vendor blog \'DeadRinger\' Reveals Pervasive Cyber Espionage Campaign Lior Div DeadRinger China In the summer of 2019, our researchers discovered a massive malicious campaign against telecommunications providers that we dubbed Operation Soft Cell. This week, our researchers revealed details of more pervasive attacks against telecommunications providers. The DeadRinger report reveals a cyber espionage campaign out of China targeting providers in Southeast Asia.]]> 2021-08-06T16:32:00+00:00 https://www.cybereason.com/blog/deadringer-reveals-pervasive-cyber-espionage-campaign www.secnews.physaphae.fr/article.php?IdArticle=3185258 False None None None CybeReason - Vendor blog CISO Stories Podcast: Managing the Security Product Salesperson CISO Stories Podcast: Managing the Security Product Salesperson CISOs are approached frequently by salespersons seeking to sell products that are supposed to reduce risk. How should a CISO manage these relationships? Kevin Morrison, CISO at Alaska Air Group, joins the podcast to discuss strategies for dealing with salespeople and selecting the best products for the organization - check it out...]]> 2021-08-05T12:55:48+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-managing-the-security-product-salesperson www.secnews.physaphae.fr/article.php?IdArticle=3177226 False None None None CybeReason - Vendor blog Partners in Crime: How Ransomware Gangs Are Working Together Partners in Crime: How Ransomware Gangs Are Working Together By now, it's clear that paying the ransom won't necessarily help ransomware victims to recover their data. Paying up also doesn't guarantee that victims will be safe from secondary attacks. According to our ransomware report, 80% of organizations that opted to pay a ransom demand ended up suffering another attack. Nearly half (46%) of those victims said they believed that the same attackers had infected them again, while 34% felt that it might have been someone else.]]> 2021-08-04T12:37:12+00:00 https://www.cybereason.com/blog/partners-in-crime-how-ransomware-gangs-are-working-together www.secnews.physaphae.fr/article.php?IdArticle=3171577 False Ransomware None None CybeReason - Vendor blog DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos Following the discovery of Hafnium attacks targeting Microsoft Exchange vulnerabilities, the Cybereason Nocturnus and Incident Response teams proactively hunted for various threat actors trying to leverage similar techniques in-the-wild. In the beginning of 2021, the Cybereason Nocturnus Team investigated clusters of intrusions detected targeting the telecommunications industry across Southeast Asia. During the investigation, three clusters of activity were identified and showed significant connections to known threat actors, all suspected to be operating on behalf of Chinese state interests. The report comes on the heels of the Biden administration's public rebuke of China's Ministry of State Security for the recent HAFNIUM attacks that exploited vulnerabilities in unpatched Microsoft Exchange Servers and put thousands of organizations worldwide at risk. Exploitation of these same vulnerabilities were central to the success of the attacks detailed in this research.]]> 2021-08-03T04:03:00+00:00 https://www.cybereason.com/blog/deadringer-exposing-chinese-threat-actors-targeting-major-telcos www.secnews.physaphae.fr/article.php?IdArticle=3164929 False Threat None None CybeReason - Vendor blog Webinar: DeadRinger - Exposing Chinese Threat Actors Targeting Major Telcos Webinar: DeadRinger - Exposing Chinese Threat Actors Targeting Major Telcos The Cybereason Nocturnus Research Team recently released a major threat intelligence research report titled DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos, which details the discovery of several previously unidentified attack campaigns targeting the telecommunications industry across Southeast Asia, where several clusters of attack activity were identified and assessed to be the work of several prominent APT groups who are known to conduct operations aligned with the interests of the Chinese government.]]> 2021-08-03T04:00:17+00:00 https://www.cybereason.com/blog/webinar-deadringer-exposing-chinese-threat-actors-targeting-major-telcos www.secnews.physaphae.fr/article.php?IdArticle=3164930 False Threat None None CybeReason - Vendor blog What the Growing Costs of a Data Breach Means for the Business What the Growing Costs of a Data Breach Means for the Business A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization's brand, unplanned workforce reductions, and little in the way of relief from cyber insurance policies. An esteemed panel of subject matter experts will examine the research findings and discuss how organizations can better prepare to defend against and respond to a ransomware attack, and the full on-demand webinar can be found here. Recently, IBM came out with its Cost of a Data Breach Report 2021. This publication synthesizes the Ponemon Institute's research of 537 breaches that affected 17 different industries and that occurred across 17 countries and regions. It also draws on nearly 3,500 interviews to understand how much those breaches cost organizations and what decision makers are doing to better defend against security incidents going forward.]]> 2021-08-02T12:07:17+00:00 https://www.cybereason.com/blog/what-the-growing-costs-of-a-data-breach-means-for-the-business www.secnews.physaphae.fr/article.php?IdArticle=3161394 True Ransomware,Data Breach None None CybeReason - Vendor blog Malicious Life Podcast: The State of Credit Card Security Malicious Life Podcast: The State of Credit Card Security In 2005, when Albert Gonzalez was hacking his way into the networks of many retail chains in the US (listen to Part 1, Part 2 and Part 3), credit cards were still very insecure: magnetic stripes and signed receipts did little to stop smart hackers such as Gonzalez and his crew.]]> 2021-08-02T12:04:49+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-state-of-credit-card-security www.secnews.physaphae.fr/article.php?IdArticle=3161002 False None None None CybeReason - Vendor blog CISO Stories Podcast: Ransomware Attacks and the True Cost to Business CISO Stories Podcast: Ransomware Attacks and the True Cost to Business A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization's brand, unplanned workforce reductions, and little in the way of relief from cyber insurance policies.]]> 2021-07-30T20:20:45+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-ransomware-attacks-and-the-true-cost-to-business www.secnews.physaphae.fr/article.php?IdArticle=3152933 True Ransomware None None CybeReason - Vendor blog Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems As enterprise technical infrastructures become more complex, managing them grows increasingly difficult. Protection against the growing problem of cybercrime also remains a key aspect for anyone involved in IT management. Cybersecurity considerations are especially critical for organizations involved in Customer Experience Automation and CRM, such as my company ActiveCampaign. ]]> 2021-07-29T13:45:07+00:00 https://www.cybereason.com/blog/cybereason-offers-comprehensive-visibility-and-protection-for-diverse-systems www.secnews.physaphae.fr/article.php?IdArticle=3148108 False None None None CybeReason - Vendor blog CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable Speed to market is the mantra of software development today. This does not mean that a process is not followed, it means that an iterative approach to software development produces code changes and usable code much faster.]]> 2021-07-28T12:33:28+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-developing-secure-agile-code-quickly-is-very-achievable www.secnews.physaphae.fr/article.php?IdArticle=3144409 False None None None CybeReason - Vendor blog The XDR Advantage: Eliminate Dwell Time and Gain Visibility The XDR Advantage: Eliminate Dwell Time and Gain Visibility The average cost of a data breach in 2020 was $3.86 million, according to IBM. It was even more expensive for certain entities. Indeed, that cost rose to $8.64 million when attackers succeeded in breaching an organization located in the United States. It was the same story in the healthcare industry, with the cost of data breaches climbing to $7.13 million for affected entities. ]]> 2021-07-27T12:56:20+00:00 https://www.cybereason.com/blog/the-xdr-advantage-eliminate-dwell-time-and-gain-visibility www.secnews.physaphae.fr/article.php?IdArticle=3139895 False Data Breach None None