www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-06-06T23:22:21+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog The Line in the Sand: How We Respond Today Impacts Our Security Tomorrow The Line in the Sand: How We Respond Today Impacts Our Security Tomorrow In the past few months, we've faced massive attacks with SolarWinds and the HAFNIUM attacks targeting Microsoft Exchange, followed by the unprecedented ransomware attack by DarkSide that crippled US critical infrastructure. It is time to ask ourselves again, what is really going on? More importantly, the time has come for the United States government to do some soul searching on why defenses have failed and how we can prevent similar attacks in the future. ]]> 2021-06-01T12:51:20+00:00 https://www.cybereason.com/blog/the-line-in-the-sand-how-we-respond-today-impacts-our-security-tomorrow www.secnews.physaphae.fr/article.php?IdArticle=2865542 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: China\'s Unrestricted Cyberwarfare Part 2 Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 2 In China's Unrestricted Cyberwarfare Part 1 we explored the story of two Chinese military officers, veterans of the semi-conflict with Taiwan, who helped shape the role of cyber in modern warfare in China and beyond with special guest Lieutenant Colonel, USMC (retired) Bill Hagestad, a leading international authority on cyberwarfare and Chinese cyber operations and capabilities specifically.]]> 2021-06-01T12:13:07+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2 www.secnews.physaphae.fr/article.php?IdArticle=2865543 False Guideline None None CybeReason - Vendor blog XDR: Moving Beyond the Limits of SIEM and SOAR XDR: Moving Beyond the Limits of SIEM and SOAR Organizations around the world are under siege from cyberattacks, and they need tools that can protect against malware, exploits, and increasingly sophisticated attacks on both devices and users. SIEM, SOAR and EDR technologies all have their benefits, but organizations with mature security programs are looking to move beyond the limits of these offerings - that's where the advent of XDR comes into play.]]> 2021-05-27T12:51:11+00:00 https://www.cybereason.com/blog/xdr-moving-beyound-the-limits-of-siem-and-soar www.secnews.physaphae.fr/article.php?IdArticle=2845909 False None None None CybeReason - Vendor blog Ransomware Trends: Six Notable Ransomware Attacks from 2021 Ransomware Trends: Six Notable Ransomware Attacks from 2021 The security community witnessed triple-digit growth in the number of publicly disclosed ransomware incidents in 2020. As noted in a previous blog post on Five Things You Need to Know About Ransomware Attacks, ransomware attacks grew 715% in H1 2020 compared to the first half of the previous year. Ransomware incidents for 2020 overall increased by more than 150%.]]> 2021-05-26T12:52:12+00:00 https://www.cybereason.com/blog/ransomware-trends-six-notable-ransomware-attacks-from-2022 www.secnews.physaphae.fr/article.php?IdArticle=2840527 False Ransomware None None CybeReason - Vendor blog Cybereason Makes Big Debut on CNBC 2021 Disruptor 50 List Cybereason Makes Big Debut on CNBC 2021 Disruptor 50 List The Cybereason team is thrilled to have been named to the CNBC 2021 Disruptor 50 list of the most disruptive privately-held global companies. Cybereason debuted in the #32 spot and is one of only two cybersecurity companies on the list. Cybereason was chosen from a record number of nearly 1,600 nominations. ]]> 2021-05-25T13:19:15+00:00 https://www.cybereason.com/blog/cybereason-makes-big-debut-on-cnbc-2021-disruptor-50-list www.secnews.physaphae.fr/article.php?IdArticle=2835690 False None None None CybeReason - Vendor blog CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets We have limited investment dollars and therefore must ensure we are protecting the right assets. The practical side of determining “what” needs to be protected and “how” is a convoluted maze of academics, taxonomies, frameworks, and inconsistent approaches.]]> 2021-05-25T12:29:32+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-five-critical-elements-for-protecting-the-right-assets www.secnews.physaphae.fr/article.php?IdArticle=2835506 False None None None CybeReason - Vendor blog New Cybersecurity Executive Order: Will It Have Impact? New Cybersecurity Executive Order: Will It Have Impact? The state of the threat landscape in general, and incidents like the recent ransomware attack against Colonial Pipeline demand that we take immediate action to improve cybersecurity defenses. The recent executive order (EO) on cybersecurity from President Biden is a bold step in the right direction.  ]]> 2021-05-25T12:23:45+00:00 https://www.cybereason.com/blog/new-cybersecurity-executive-order-will-it-have-impact www.secnews.physaphae.fr/article.php?IdArticle=2835507 False Threat None None CybeReason - Vendor blog Record Setting $40M Ransom Paid to Attackers Record Setting $40M Ransom Paid to Attackers CNA, one of the largest U.S. commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that's the largest ransom demand ever reported to have been paid by a company following a ransomware attack.]]> 2021-05-24T20:59:01+00:00 https://www.cybereason.com/blog/record-setting-40m-ransom-paid-to-attackers www.secnews.physaphae.fr/article.php?IdArticle=2832778 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Untold Story of the RSA Breach Part 2 Malicious Life Podcast: The Untold Story of the RSA Breach Part 2 In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product, a solution that was in-use by thousands of high-profile clients around the world including the U.S. government and an array of U.S. defense contractors. The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data.  In this second episode (listen to Part 1 here) of the Malicious Life Podcast, host Ran Levy is joined by two former RSA executives who were integral to the company's incident response at the time of the attacks and only recently were released from a 10-year NDA that barred them from discussing the incident. For the first time, they elaborate in detail on how the events unfolded and share the untold story behind one of the most impactful attacks of all time - check it out...]]> 2021-05-24T12:03:41+00:00 https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-2 www.secnews.physaphae.fr/article.php?IdArticle=2830819 True Guideline None None CybeReason - Vendor blog Webinar: XDR or EDR: How Should Your SOC Choose? Webinar: XDR or EDR: How Should Your SOC Choose? If you have doubts in your organisation's ability to identify and defeat modern attackers, you're not alone. We're living in a world where IT infrastructure, attacker trends, and workspace norms are constantly shifting, so it's especially challenging to build a solid security foundation with tested best practices. Companies are struggling to prove effective cybersecurity due to a lack of visibility, a shortage of skilled staff, and challenges matching today's accelerated business pace. ]]> 2021-05-21T13:02:13+00:00 https://www.cybereason.com/blog/webinar-xdr-or-edr-how-should-your-soc-choose www.secnews.physaphae.fr/article.php?IdArticle=2820457 False None None None CybeReason - Vendor blog Malicious Life Podcast: The Untold Story of the RSA Breach Part 1 Malicious Life Podcast: The Untold Story of the RSA Breach Part 1 In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product. The solution was in-use by thousands of high-profile clients around the world, including the U.S. government and an array of U.S. defense contractors. The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data.  In this special episode of the Malicious Life Podcast, host Ran Levy is joined by two former RSA executives who were integral to the company's incident response at the time of the attacks and only recently were released from a 10-year NDA that barred them from discussing the incident. For the first time, they elaborate in detail on how the events unfolded and share the untold story behind one of the most impactful attacks of all time. Ran also talks with Wired Magazine's Andy Greenberg who provides some context on why the RSA breach was such a watershed moment for the security industry. Check out Andy's deep dive on the RSA breach with additional interviews, including thoughts from former RSA CEO Art Coviello.]]> 2021-05-20T10:07:14+00:00 https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2815513 False Guideline None None CybeReason - Vendor blog Cybereason Experts Take Center Stage at RSA Conference 2021 Cybereason Experts Take Center Stage at RSA Conference 2021 Cybereason is excited to announce that Chief Information Security Officer Israel Barak and Principal Security Advocate Lodrina Cherne are taking center stage at the RSA Conference on Thursday, May 21, in two speaking sessions. ]]> 2021-05-19T14:49:53+00:00 https://www.cybereason.com/blog/cybereason-experts-take-center-stage-at-rsa-conference-2021 www.secnews.physaphae.fr/article.php?IdArticle=2811130 False None None None CybeReason - Vendor blog SC Awards Europe: Cybereason Named Finalist for Best Endpoint Security SC Awards Europe: Cybereason Named Finalist for Best Endpoint Security Cybereason is excited to announce it was named a finalist in the Best Endpoint Security category of the 2021 SC Awards Europe competition. Winners will be announced June 8, 2021. Earlier this year, Cybereason was named a finalist for Best Enterprise Security product with SC Awards U.S.]]> 2021-05-19T13:52:17+00:00 https://www.cybereason.com/blog/sc-awards-europe-cybereason-named-finalist-for-best-endpoint-security www.secnews.physaphae.fr/article.php?IdArticle=2810966 False None None None CybeReason - Vendor blog Evaluating XDR Against EDR, SIEM and SOAR Solutions Evaluating XDR Against EDR, SIEM and SOAR Solutions XDR, shorthand for the emerging Extended Detection and Response solution offerings, has quickly established itself as one of the best options for defending the modern enterprise IT infrastructure against cyberattacks. But many are still trying to wrap their minds around XDR and where exactly it fits compared to other established solutions like SIEM, SOAR, and EDR.]]> 2021-05-19T12:44:56+00:00 https://www.cybereason.com/blog/evaluating-xdr-against-edr-siem-and-soar-solutions www.secnews.physaphae.fr/article.php?IdArticle=2810422 False None None None CybeReason - Vendor blog Unpacking the Gartner Critical Capabilities Research Unpacking the Gartner Critical Capabilities Research The importance of third-party research and testing cannot be overstated in the current security marketscape. Important details for consideration when evaluating a solution to onboard for detection and response can be obscure and difficult to clearly understand. Vendors will always position themselves in as positive of a light as possible, which can lead to frustration and head-scratching during the evaluation process.]]> 2021-05-18T12:46:12+00:00 https://www.cybereason.com/blog/unpacking-the-gartner-critical-capabilities-research www.secnews.physaphae.fr/article.php?IdArticle=2804851 False Guideline None None CybeReason - Vendor blog CISO Stories Podcast: Passion for Solving Problems is Key to Security CISO Stories Podcast: Passion for Solving Problems is Key to Security Will Lin, founding team member at ForgePoint Capital and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing - check it out...]]> 2021-05-18T12:42:37+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-passion-for-solving-problems-is-key-to-security www.secnews.physaphae.fr/article.php?IdArticle=2804852 False None None None CybeReason - Vendor blog DarkSide Gang and the New Golden Age of Piracy DarkSide Gang and the New Golden Age of Piracy Late on Friday May 7, 2021, Colonial Pipeline, the company that runs the largest gasoline pipeline in the US, shut down operations following a ransomware attack on their systems. It later emerged that a relatively new ransomware-as-a-service criminal organization known as DarkSide was behind the attack - but there was a twist.]]> 2021-05-17T13:48:43+00:00 https://www.cybereason.com/blog/darkside-gang-and-the-new-golden-age-of-piracy www.secnews.physaphae.fr/article.php?IdArticle=2799740 False Ransomware None None CybeReason - Vendor blog Solving the Ransomware Crisis Solving the Ransomware Crisis Ransomware attacks are trivial to execute and there is little, if any, risk and no penalties for the attackers. As a victim, there are no good choices once an organization is hit by ransomware. You can ignore the ransom demand and restore your data from backups and take your chances with the risk of data exposure. At the same time, the reality is that it doesn't pay to pay--it is not a guarantee that you will get all of the data back in a usable state. In addition, when you pay the ransom you are essentially funding these criminals who are acting as terrorists. The chances are that you are funding additional research and development of the next exploit or ransomware variant, so paying the ransom just makes the problem bigger. Organizations that pay the ransom also risk putting a bullseye on their backs-making themselves attractive targets for future ransomware attacks because they have established that they're willing to pay. The only good option is to avoid having your data stolen or encrypted in the first place, which is why it needs to be a global priority to solve this crisis.]]> 2021-05-14T20:21:22+00:00 https://www.cybereason.com/blog/solving-the-ransomware-crisis www.secnews.physaphae.fr/article.php?IdArticle=2788676 False Ransomware None None CybeReason - Vendor blog Webinar: Future-Proofing Security Programs in 2021 and Beyond Webinar: Future-Proofing Security Programs in 2021 and Beyond 2020 was a year of learning, with surges in ransomware, nation states infecting supply chains from Solar Winds to Microsoft, and radical new work models that might presage a “new normal.” ]]> 2021-05-14T18:46:10+00:00 https://www.cybereason.com/blog/webinar-future-proofing-security-programs-in-2021-and-beyond www.secnews.physaphae.fr/article.php?IdArticle=2787988 False None None None CybeReason - Vendor blog CISO Stories Podcast: Effective Health Care Security is More Than HIPAA CISO Stories Podcast: Effective Health Care Security is More Than HIPAA Healthcare security today is extremely complex due to the integrated clinical systems and connected community networks. As well, no longer are the medical records stored with a single provider. ]]> 2021-05-13T13:27:11+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-effective-health-care-security-is-more-than-hipaa www.secnews.physaphae.fr/article.php?IdArticle=2779770 False None None None CybeReason - Vendor blog Ransomware Attacks are Evolving – Is Your SOC Ready? Ransomware Attacks are Evolving – Is Your SOC Ready? Ransomware actors are known to innovate on a regular basis, and these past few years have seen an acceleration in the evolution of tactics and techniques designed to make the attacks more effective.]]> 2021-05-12T13:27:30+00:00 https://www.cybereason.com/blog/ransomware-attacks-are-evolving-is-your-soc-ready www.secnews.physaphae.fr/article.php?IdArticle=2774116 False None None None CybeReason - Vendor blog Webinar: Cybereason vs. DarkSide Ransomware Webinar: Cybereason vs. DarkSide Ransomware Colonial Pipeline was recently the victim of a devastating attack that shut down U.S. operations across the East Coast, threatening an already tenuous economic recovery effort. This attack against critical infrastructure by the DarkSide Ransomware gang highlights the urgent need for better ransomware prevention, detection and response.]]> 2021-05-11T22:19:35+00:00 https://www.cybereason.com/blog/webinar-cybereason-vs.-darkside-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2770645 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Creating BSides - A Grassroots Security Conference Malicious Life Podcast: Creating BSides - A Grassroots Security Conference Security BSides - or just 'BSides' for those in the know - is the first grassroots, DIY, open security conference in the world, and has grown to more than 650 events in more than 50 countries.]]> 2021-05-11T13:35:53+00:00 https://www.cybereason.com/blog/malicious-life-podcast-creating-bsides-a-grassroots-security-conference www.secnews.physaphae.fr/article.php?IdArticle=2767560 False None None None CybeReason - Vendor blog Inside the DarkSide Ransomware Attack on Colonial Pipeline Inside the DarkSide Ransomware Attack on Colonial Pipeline On May 8, the Colonial Pipeline Company announced that it had fallen victim to a ransomware attack a day earlier. The pipeline operations include transporting 100 million gallons of fuel daily to meet the needs of consumers across the entire eastern seaboard of the U.S. from Texas to New York, according to the website of the refined products pipeline company.]]> 2021-05-10T19:57:09+00:00 https://www.cybereason.com/blog/inside-the-darkside-ransomware-attack-on-colonial-pipeline www.secnews.physaphae.fr/article.php?IdArticle=2763585 False Ransomware None None CybeReason - Vendor blog Defining XDR from an MSSP Perspective Defining XDR from an MSSP Perspective If you're not entirely clear on what Extended Detection and Response (XDR) is, you wouldn't be alone. Most understand it as the evolution of Endpoint Detection and Response (EDR) that covers the areas of the attack surface beyond the endpoint, including assets like cloud workloads, containers, and user identities.]]> 2021-05-10T13:05:02+00:00 https://www.cybereason.com/blog/defining-xdr-from-an-mssp-perspective www.secnews.physaphae.fr/article.php?IdArticle=2761139 False None None None CybeReason - Vendor blog The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP The Cybereason team is excited to announce that Gartner has named Cybereason a Visionary in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. This is Cybereason's first recognition in this influential industry report, and we believe our placement in the Visionary Quadrant is because of the value and future-readiness of the Cybereason Defense Platform and the superior endpoint protection (EPP) and extended detection and response (XDR) functionality that it delivers. ]]> 2021-05-06T15:18:49+00:00 https://www.cybereason.com/blog/the-cybereason-advantage-why-cybereason-was-named-a-visionary-in-the-2021-gartner-magic-quadrant-for-epp www.secnews.physaphae.fr/article.php?IdArticle=2746721 False None None None CybeReason - Vendor blog CISO Stories Podcast: Stop Reporting Useless Security Metrics! CISO Stories Podcast: Stop Reporting Useless Security Metrics! All disciplines need to be able to demonstrate added value and track the ability to improve upon current practices. The board, technical management, auditors, and engineers may each need a different view of the security initiatives performed.]]> 2021-05-06T13:22:43+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-stop-reporting-useless-security-metrics www.secnews.physaphae.fr/article.php?IdArticle=2746110 False None None None CybeReason - Vendor blog Three Keys to a Reliable Ransomware Defense Strategy Three Keys to a Reliable Ransomware Defense Strategy As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 - 62% more than the total number of ransomware attacks for 2019. The estimated cost of those incidents increased from $11.5 billion to $20 billion during that same time period. Average ransom costs also rose from $5,900 to $8,100 between those two years, with associated downtime losses growing from $141,000 to $283,000.]]> 2021-05-05T13:10:23+00:00 https://www.cybereason.com/blog/three-keys-to-a-reliable-ransomware-defense-strategy www.secnews.physaphae.fr/article.php?IdArticle=2742234 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: China\'s Unrestricted Cyberwarfare Part 1 Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 Back in the 1990s, cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking its first steps on the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond.]]> 2021-05-04T12:05:16+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2737250 False None None None CybeReason - Vendor blog Securing the Financial Sector Now and Into the Future with XDR Securing the Financial Sector Now and Into the Future with XDR Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, days, or weeks. Unfortunately, time is the most precious resource when responding to incidents. The longer adversaries linger in an IT environment, the longer they have to deploy footholds, move to other machines, and access more data.]]> 2021-05-03T12:58:32+00:00 https://www.cybereason.com/blog/securing-the-financial-sector-now-and-into-the-future-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=2732440 False None None None CybeReason - Vendor blog 100 Days Down, 1,360 Days of Nation-State Cybersecurity Threats to Go CEO Blog Series This week marks the milestone of the Biden Administration's first 100 days. It is somewhat arbitrary to expect an incoming president to achieve significant progress in just 100 days, or to judge success or failure based on such a small span of time. However, it does provide a glimpse into the vision and direction of the administration, and so far it seems like President Biden is preparing to address the growing cybersecurity threat from our adversaries. ]]> 2021-04-30T12:20:47+00:00 https://www.cybereason.com/blog/100-days-down-1360-days-of-nation-state-cybersecurity-threats-to-go www.secnews.physaphae.fr/article.php?IdArticle=2721690 False Threat None None CybeReason - Vendor blog PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector The Cybereason Nocturnus Team has been tracking recent developments in the RoyalRoad weaponizer, also known as the 8.t Dropper/RTF exploit builder. Over the years, this tool has become a part of the arsenal of several Chinese-related threat actors such as Tick, Tonto Team and TA428, all of which  employ RoyalRoad regularly for spear-phishing in targeted attacks against high-value targets. ]]> 2021-04-30T12:11:34+00:00 https://www.cybereason.com/blog/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector www.secnews.physaphae.fr/article.php?IdArticle=2721691 False Tool,Threat None None CybeReason - Vendor blog CISO Stories Podcast: Necessity is the Mother of Security CISO Stories Podcast: Necessity is the Mother of Security Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges - check it out...]]> 2021-04-29T12:38:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-necessity-is-the-mother-of-security www.secnews.physaphae.fr/article.php?IdArticle=2714324 False None None 2.0000000000000000 CybeReason - Vendor blog Webinar: The Current State and Future Challenges of Security Webinar: The Current State and Future Challenges of Security Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. Supply Chain weaknesses, Ransomware, the “new normal” going forward, the evolution of the MITRE framework and more are all fair game.]]> 2021-04-28T13:54:57+00:00 https://www.cybereason.com/blog/webinar-the-current-state-and-future-challenges-of-security www.secnews.physaphae.fr/article.php?IdArticle=2708704 False None None None CybeReason - Vendor blog Five Things You Need to Know About Ransomware Attacks Five Things You Need to Know About Ransomware Attacks The digital threat landscape as a whole is constantly changing and evolving. That can make it difficult to keep track of new developments for specific threats like ransomware. Don't worry though, Cybereason has got you covered.]]> 2021-04-28T12:59:38+00:00 https://www.cybereason.com/blog/five-things-you-need-to-know-about-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=2708451 False Ransomware,Threat None None CybeReason - Vendor blog Cybereason vs. Avaddon Ransomware Cybereason vs. Avaddon Ransomware Over the last few months, the Cybereason Nocturnus Team has been tracking the activity of the Avaddon Ransomware. It has been active since June 2020 and is operating with the Ransomware-as-a-Service (RaaS) and double extortion models, targeting sectors such as healthcare. Avaddon is distributed via malspam campaigns, where the victim is being lured to download the malware loader.]]> 2021-04-27T14:52:51+00:00 https://www.cybereason.com/blog/cybereason-vs.-avaddon-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2703416 False Ransomware,Malware None None CybeReason - Vendor blog Malicious Life Podcast: Can Nuclear Power Plants Be Hacked? Malicious Life Podcast: Can Nuclear Power Plants Be Hacked? Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, dives into cybersecurity challenges for Nuclear facilities - how secure are modern nuclear power plants from cyber attacks? Check it out...]]> 2021-04-27T13:08:29+00:00 https://www.cybereason.com/blog/malicious-life-can-nuclear-power-plants-be-hacked www.secnews.physaphae.fr/article.php?IdArticle=2702837 False None None None CybeReason - Vendor blog Integrating Endpoint and Mobile Device Security Integrating Endpoint and Mobile Device Security Enterprise teams are advised in this report to integrate their traditional and next-generation endpoint security protections with emerging mobile security safeguards.]]> 2021-04-26T12:05:22+00:00 http://www.cybereason.com/blog/integrating-endpoint-and-mobile-device-security www.secnews.physaphae.fr/article.php?IdArticle=2695215 False None None None CybeReason - Vendor blog HAFNIUM Exploits Live On HAFNIUM Exploits Live On The Prometei Botnet is not new. Like most malware and exploits, it continues to adapt and change over time. What is concerning is what is happening now. Our latest research demonstrates  how Prometei has evolved and reveals that current versions of Prometei are now exploiting some of the vulnerabilities in Microsoft Exchange that were part of the recent HAFNIUM attacks. We will continue to deal with lingering effects from these specific Microsoft Exchange vulnerabilities, but-more importantly-we will continue to deal with vulnerabilities in general and that requires a better approach to cybersecurity.]]> 2021-04-22T19:27:46+00:00 https://www.cybereason.com/blog/hafnium-exploits-live-on www.secnews.physaphae.fr/article.php?IdArticle=2680024 False Malware None None CybeReason - Vendor blog Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack The Sodinokibi ransomware gang is trying to extort Apple following an attack against one of the tech giant's business partners. According to Bloomberg News, someone using the moniker “Unknown” announced on April 18 that the Sodinokibi/REvil gang was about to disclose their “largest attack ever.”]]> 2021-04-22T13:03:55+00:00 https://www.cybereason.com/blog/sodinokibi-ransomware-gang-extorts-apple-through-supply-chain-attack www.secnews.physaphae.fr/article.php?IdArticle=2678283 False Ransomware None None CybeReason - Vendor blog Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities Recently, the Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware.]]> 2021-04-22T03:55:00+00:00 https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities www.secnews.physaphae.fr/article.php?IdArticle=2676881 False None None None CybeReason - Vendor blog MITRE ATT&CK: Cybereason Dominates the Competition MITRE ATT&CK: Cybereason Dominates the Competition The long-awaited 2020 MITRE ATT&CK evaluations are out! With the MITRE ATT&CK framework now being the standard by which Defenders can measure the effectiveness of various solutions in tracking adversary behavior, cyber vendors are cherry-picking results from this latest testing round and spinning up clever interpretations of the data in their favor. At Cybereason, we are proud to let the test results speak for themselves. ]]> 2021-04-21T20:58:41+00:00 https://www.cybereason.com/blog/mitre-attck-cybereason-dominates-the-competition www.secnews.physaphae.fr/article.php?IdArticle=2675659 False None None None CybeReason - Vendor blog Inside Effective EDR Evaluation Testing Inside Effective EDR Evaluation Testing Periodically, I receive requests from customers asking for explanations on why this particular technique or that one doesn't generate a Malop™ in the Cybereason Defense Platform. Such questions illustrate that there is still a great deal of education to be done on the nature of EDR across much of the security industry. ]]> 2021-04-21T19:08:01+00:00 https://www.cybereason.com/blog/inside-effective-edr-evaluation-testing www.secnews.physaphae.fr/article.php?IdArticle=2675660 False None None None CybeReason - Vendor blog CISO Stories Podcast: He Fought the FTC Over a Breach and Won CISO Stories Podcast: He Fought the FTC Over a Breach and Won Hopefully, you won't ever have to hire a lawyer to defend yourself against a government regulator. So what happens when the Federal Trade Commission or other powerful body baselessly accuses your company of wrongdoing where a data breach is concerned?]]> 2021-04-21T14:16:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-he-fought-the-ftc-over-a-breach-and-won www.secnews.physaphae.fr/article.php?IdArticle=2674777 False Data Breach None None CybeReason - Vendor blog Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations The results of the latest ATT&CK Evaluation, conducted by MITRE Engenuity, are out! Our Cybereason Defense Platform was evaluated on its ability to prevent and detect advanced attacks, achieving 100% coverage for prevention of Windows and Linux-based threats, and 98% technique visibility across the 54 advanced attack techniques applied in testing. The MITRE Evaluation validates Cybereason's future-ready attack protection, and superior prevention, detection and response capabilities.]]> 2021-04-20T17:05:14+00:00 https://www.cybereason.com/blog/cybereason-excels-in-2020-mitre-engenuity-attck-evaluations www.secnews.physaphae.fr/article.php?IdArticle=2671369 False None None None CybeReason - Vendor blog Malicious Life Podcast: Shutting Down the Internet in 30 Minutes Malicious Life Podcast: Shutting Down the Internet in 30 Minutes Chris Wysopal (aka WeldPond), cybersecurity pioneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force corporations to secure their software, and the (not so fortunate) consequences of the acquisition by @stake - check it out...]]> 2021-04-20T12:39:19+00:00 https://www.cybereason.com/blog/malicious-life-shutting-down-the-internet-in-30-min www.secnews.physaphae.fr/article.php?IdArticle=2670634 False None None None CybeReason - Vendor blog Ransomware Decoded: Preventing Modern Ransomware Attacks Ransomware Decoded: Preventing Modern Ransomware Attacks Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing immediate damage.]]> 2021-04-19T13:25:54+00:00 https://www.cybereason.com/blog/preventing-modern-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=2666029 False Ransomware,Malware None None CybeReason - Vendor blog Cybereason and MassCyberCenter Partner to Mentor College Students Cybereason and MassCyberCenter Partner to Mentor College Students Cybereason is pleased to announce that it has joined with the MassCyberCenter at the MassTech Collaborative and other Massachusetts companies to mentor college students from 14 schools across the state. Cybereason has three on-staff mentors, including: Sam Curry, Chief Security Officer, Lodrina Cherne, Principal Security Advocate and Maggie MacAlpine, Security Strategist. ]]> 2021-04-16T13:59:20+00:00 https://www.cybereason.com/blog/cybereason-and-masscybercenter-partner-to-mentor-college-students www.secnews.physaphae.fr/article.php?IdArticle=2653167 False None None None CybeReason - Vendor blog MITRE ATT&CK Evaluations - Unpacking the Emulation MITRE ATT&CK Evaluations - Unpacking the Emulation If you've been researching MITRE ATT&CK and aligning your security program maturity measurement to it, you're likely excited for this year's ATT&CK evaluation from MITRE Engenuity, which tests security vendors' ability to quickly detect and stop tactics and techniques used by today's threat actors.]]> 2021-04-15T18:02:25+00:00 https://www.cybereason.com/blog/mitre-attck-evaluations-unpacking-the-emulation www.secnews.physaphae.fr/article.php?IdArticle=2647605 False Threat None None CybeReason - Vendor blog CISO Stories Podcast: Is There a Magic Security Control List? CISO Stories Podcast: Is There a Magic Security Control List? Never in history has the cyber defender had access to so many technologies and tools to defend our companies. This has created a “Fog of More,” making the choices difficult to manage. This week's guest is Tony Sager, a 35-year NSA software vulnerability analyst and executive, and the innovator of community-based controls sharing. Sager discusses how the CIS Controls can be used effectively to manage your environment - check it out...]]> 2021-04-15T13:13:18+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-is-there-a-magic-security-control-list www.secnews.physaphae.fr/article.php?IdArticle=2646015 False Vulnerability None None CybeReason - Vendor blog Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks We live in a world of insecurity where malicious actors have for too long enjoyed an advantage over defenders charged with protecting their organization's networks from cyberattacks. Nowhere is that more evident than with critical infrastructure providers who are facing a constant barrage of attacks from motivated cybercriminals and well-funded state-sponsored actors.]]> 2021-04-14T18:47:09+00:00 https://www.cybereason.com/blog/biden-admin-takes-action-to-defend-electric-utilities-against-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=2640869 False None None None CybeReason - Vendor blog Rise of Double-Extortion Shines Spotlight on Ransomware Prevention Rise of Double-Extortion Shines Spotlight on Ransomware Prevention Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim's machine before launching its encryption routine.]]> 2021-04-14T13:01:39+00:00 https://www.cybereason.com/blog/rise-of-double-extortion-shines-spotlight-on-ransomware-prevention www.secnews.physaphae.fr/article.php?IdArticle=2638198 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2 Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2 In the early days, the L0pht crew tinkered with technology they already had laying around or could find dumpster-diving. But things change, of course. By the end of the '90s many of the L0pht hackers had quit their day jobs and incorporated under the name “L0pht Heavy Industries” while moving into a nicer space, the “new L0pht.”]]> 2021-04-13T13:42:55+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p2 www.secnews.physaphae.fr/article.php?IdArticle=2630823 False None None None CybeReason - Vendor blog Five Clear Steps to Enhance SecOps with MITRE ATT@CK Five Clear Steps to Enhance SecOps with MITRE ATT@CK A skyrocketing number of alerts, limited security talent, and millions of new malware strains daily have made security a seemingly insurmountable task. ]]> 2021-04-12T02:50:19+00:00 https://www.cybereason.com/blog/steps-to-enhance-secops-with-mitre-attck www.secnews.physaphae.fr/article.php?IdArticle=2622804 False Malware None None CybeReason - Vendor blog CISO Stories Podcast: Doing Security Before Security Was a Career Path CISO Stories Podcast: Doing Security Before Security Was a Career Path Special guest Petri Kuivala, CISO at NXP Semiconductors, recounts his journey from municipal police officer to cybercrimes unit investigator to Chief Information Security Officer during the early days when security was largely an afterthought - check it out...]]> 2021-04-08T14:28:16+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-doing-security-before-security-was-career-path www.secnews.physaphae.fr/article.php?IdArticle=2605066 False None None None CybeReason - Vendor blog The Cybereason Difference: Introduction to the Malop The Cybereason Difference: Introduction to the Malop Welcome to the April edition of our series The Cybereason Difference (inaugural post here). Each post of this series explores a unique way that Cybereason empowers defenders.]]> 2021-04-07T13:19:32+00:00 https://www.cybereason.com/blog/the-cybereason-difference-malop-intro www.secnews.physaphae.fr/article.php?IdArticle=2599434 False None None None CybeReason - Vendor blog Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1 Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1 'L0pht', or 'L0pht Heavy Industries' was one of the most influential hacker collectives of the '90s: its members were even invited to testify in front of the Congress on the current state of Internet security.]]> 2021-04-06T14:27:20+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p1 www.secnews.physaphae.fr/article.php?IdArticle=2593323 False None None None CybeReason - Vendor blog Cybereason Empowers Partners with North American MSSP Program Expansion Cybereason Empowers Partners with North American MSSP Program Expansion Cybereason is pleased to announce expansion of the North American channel with the launch of the Managed Security Services Provider (MSSP) Program. The program will support current and future partners by enhancing revenue streams through improved efficacy in detection and response services they offer to their clients. ]]> 2021-04-06T13:39:57+00:00 https://www.cybereason.com/blog/cybereason-empowers-partners-with-north-american-mssp-program-expansion www.secnews.physaphae.fr/article.php?IdArticle=2592788 False None None None CybeReason - Vendor blog Personal Info for More Than Half a Billion Facebook Users Leaked Online Personal Info for More Than Half a Billion Facebook Users Leaked Online Someone leaked the phone numbers and personal information for over half a billion Facebook users online. Alon Gal, CTO at cybercrime intelligence firm Hudson Rock, tweeted out that someone had dumped hundreds of millions of Facebook records onto a hacking forum: ]]> 2021-04-05T21:23:44+00:00 https://www.cybereason.com/blog/personal-info-for-more-than-half-a-billion-facebook-users-leaked-online www.secnews.physaphae.fr/article.php?IdArticle=2591148 False None None None CybeReason - Vendor blog Ransomware Defense: Three Implementations Every Security Team Needs Ransomware Defense: Three Implementations Every Security Team Needs Few will be shocked to hear that ransomware attacks are continuing to accelerate at a torrid pace - but the more concerning trend is the effectiveness of ransomware at creating chaos and paralyzing business operations.]]> 2021-04-05T17:01:42+00:00 https://www.cybereason.com/blog/ransomware-defense-three-implementations-every-security-team-needs www.secnews.physaphae.fr/article.php?IdArticle=2589457 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: The Colonoscopy of CyberSecurity CISO Stories Podcast: The Colonoscopy of CyberSecurity The information and cybersecurity industry has no shortage of regulations, and many organizations simply rundown the list of requirements, load them into an excel spreadsheet and check the boxes to demonstrate they are in compliance. But is being compliant the same as being secure? Join this podcast with special guest Lee Parrish who shares an analogy that illustrates why being compliant is not the same as being secure, and how we can change an organization's orientation to keep the focus on security - check it out...]]> 2021-04-01T18:41:06+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-the-colonoscopy-of-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=2572557 False None None None CybeReason - Vendor blog Cybereason vs. DarkSide Ransomware Cybereason vs. DarkSide Ransomware DarkSide is a relatively new ransomware strain that made its first appearance in August 2020. DarkSide follows the RaaS (ransomware-as-a-service) model, and, according to Hack Forums, the DarkSide team recently made an announcement that DarkSide 2.0 has been released. According to the group, it is equipped with the fastest encryption speed on the market, and even includes Windows and Linux versions.]]> 2021-04-01T14:02:27+00:00 https://www.cybereason.com/blog/cybereason-vs-darkside-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2571331 False Ransomware,Hack None None CybeReason - Vendor blog Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach A security professional who assisted Ubiquiti in its response to a data breach accused the Internet-of-Things (IoT) device vendor of having downplayed the incident's severity.]]> 2021-03-31T19:10:25+00:00 https://www.cybereason.com/blog/whistleblower-accuses-ubiquiti-of-downplaying-major-data-breach www.secnews.physaphae.fr/article.php?IdArticle=2568096 False Data Breach None None CybeReason - Vendor blog FBI Pegs 2020 Cybercrime Costs at $4 Billion - Actual Losses Likely Higher FBI Pegs 2020 Cybercrime Costs at $4 Billion - Actual Losses Likely Higher Cybercrime cost the American public over $4 billion in reported losses over the course of 2020, according to the FBI. In its Internet Crime Report 2020, the FBI's Internet Crime Complaint Center (IC3) revealed that it had received 791,790 complaints of digital crime in 2020.]]> 2021-03-31T16:34:21+00:00 https://www.cybereason.com/blog/fbi-pegs-2020-cybercrime-costs-at-4-billion www.secnews.physaphae.fr/article.php?IdArticle=2567227 False None None None CybeReason - Vendor blog DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know The widespread HAFNIUM attacks were just the beginning of the problems stemming from multiple vulnerabilities in Microsoft's Exchange offering that were recently disclosed. According to Bleeping Computer, users began submitting new ransomware attack reports to the ID-Ransomware identification site on March 9 that site creator Michael Gillespie later determined had likely originated on Microsoft Exchange servers.]]> 2021-03-30T17:26:15+00:00 https://www.cybereason.com/blog/dearcry-ransomeware-and-the-hafnium-attacks www.secnews.physaphae.fr/article.php?IdArticle=2562407 False Ransomware None None CybeReason - Vendor blog Why Healthcare Security Requires an Operation-Centric Approach Why Healthcare Security Requires an Operation-Centric Approach The healthcare industry is getting much more attention than normal right now. COVID-19 has disrupted business operations and turned lives upside down around the world as everyone struggles to get the pandemic under control.]]> 2021-03-29T13:08:15+00:00 https://www.cybereason.com/blog/why-healthcare-security-requires-an-operation-centric-approach www.secnews.physaphae.fr/article.php?IdArticle=2555816 False None None None CybeReason - Vendor blog CISO Stories Podcast: Going All-In on a Career in Security CISO Stories Podcast: Going All-In on a Career in Security Mauro Israel, CISO at BIOOOS, discusses his colorful background and how he – like so many others in the security field – came to discover his true calling late in life and was able to apply his wide range of knowledge and experience to the role of CISO in the healthcare field - check it out..]]> 2021-03-26T14:48:04+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-career-in-security www.secnews.physaphae.fr/article.php?IdArticle=2538087 False None None None CybeReason - Vendor blog Cybereason Named a Strong Performer in Forrester Wave for MDR Cybereason Named a Strong Performer in Forrester Wave for MDR The Cybereason Managed Detection and Response (MDR) service offering has been named a Strong Performer in the Forrester Wave™: Managed Detection and Response, Q1 2021 report.]]> 2021-03-24T14:36:34+00:00 https://www.cybereason.com/blog/cybereason-named-a-strong-performer-in-forrester-wave-for-mdr-2021 www.secnews.physaphae.fr/article.php?IdArticle=2527360 False None None None CybeReason - Vendor blog Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks The recent HAFNIUM attacks hit tens of thousands of organizations' Microsoft Exchange servers around the globe. Now, an array of other threat actors are leveraging the residual webshells on victim systems to launch new attacks against organizations who thought patching the Microsoft vulnerabilities would have been enough to be protected.]]> 2021-03-23T18:00:09+00:00 https://www.cybereason.com/blog/malicious-life-podcast-bside-hafnium www.secnews.physaphae.fr/article.php?IdArticle=2523401 False Threat,Patching None None CybeReason - Vendor blog Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website that they had breached the computer giant.]]> 2021-03-23T16:54:20+00:00 https://www.cybereason.com/blog/sodinokibi/revil-ransomware-gang-hit-acer-with-50m-ransom-demand www.secnews.physaphae.fr/article.php?IdArticle=2523208 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Inside NotPetya, Part 2 Malicious Life Podcast: Inside NotPetya, Part 2 Many of you may have already heard of Amit Serper: he was the first researcher to tackle NotPetya and provide a solution when he was Principal Security Researcher at Cybereason back in 2017.]]> 2021-03-22T13:08:36+00:00 https://www.cybereason.com/blog/malicious-life-podcast-inside-notpetya-ransomware-part-2 www.secnews.physaphae.fr/article.php?IdArticle=2517105 False None NotPetya,NotPetya None CybeReason - Vendor blog HAFNIUM Response: Cybereason is Dedicated to Defending Our Customers HAFNIUM Response: Cybereason is Dedicated to Defending Our Customers It was recently disclosed that Microsoft Exchange offerings were severely compromised in nation-state sponsored operations by the threat group known as HAFNIUM. This incident has potentially affected tens-of-thousands of public and private organizations across the globe.]]> 2021-03-18T15:27:30+00:00 https://www.cybereason.com/blog/hafnium-response-cybereason www.secnews.physaphae.fr/article.php?IdArticle=2501029 False Threat None None CybeReason - Vendor blog Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware Over the past year, the Cybereason Nocturnus Team has observed various trends among cyber criminals and nation-state groups leveraging various global events such as COVID-19 and other topical themes and trending issues as phishing content to lure their victims into installing their malware of choice.]]> 2021-03-18T10:04:34+00:00 https://www.cybereason.com/blog/cybereason-exposes-malware-targeting-us-taxpayers www.secnews.physaphae.fr/article.php?IdArticle=2499265 False Malware None None CybeReason - Vendor blog CISO Stories Podcast: Is Cybersecurity ROI Necessary? CISO Stories Podcast: Is Cybersecurity ROI Necessary? Business units are often challenged to demonstrate ROI on their spend for various initiatives. Why should the information security department be any different?]]> 2021-03-17T13:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-cybersecurity-roi-necessary www.secnews.physaphae.fr/article.php?IdArticle=2495818 False None None None CybeReason - Vendor blog Security CEO Roundtable: Restoring Our National Cybersecurity Security CEO Roundtable: Restoring Our National Cybersecurity Now that President Biden has proposed the allocation of $10 Billion for cyber security and IT modernization, what specifically should the federal government focus on to restore confidence in our national cyber security defense posture?]]> 2021-03-16T16:03:52+00:00 https://www.cybereason.com/blog/security-ceo-roundtable-national-cybersecurity www.secnews.physaphae.fr/article.php?IdArticle=2491241 False None None None CybeReason - Vendor blog Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds Attackers have proven time and again they are willing to innovate in nefarious ways to breach your defenses - as seen with the most recent headlines around the recent Microsoft Exchange and SolarWinds attacks.]]> 2021-03-16T14:09:52+00:00 https://www.cybereason.com/blog/webinar-protecting-against-it-infrastructure-attacks-from-hafnium-and-solarwinds www.secnews.physaphae.fr/article.php?IdArticle=2490849 False None None None CybeReason - Vendor blog SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months The U.S. government could take up to 18 months in its efforts to recover from the SolarWinds supply chain attack, explained the U.S. Cybersecurity & Infrastructure Security Agency (CISA).]]> 2021-03-15T13:00:00+00:00 https://www.cybereason.com/blog/solarwinds-attacks-recovery-effort www.secnews.physaphae.fr/article.php?IdArticle=2485608 False None None None CybeReason - Vendor blog Webinar: The State of Ransomware Webinar: The State of Ransomware Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn't gone away and has returned with a vengeance.]]> 2021-03-12T16:31:30+00:00 https://www.cybereason.com/blog/webinar-state-of-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2474638 False Ransomware None None CybeReason - Vendor blog International Women\'s Day: Why Be Daring? International Women's Day: Why Be Daring? International Women's Day always makes me reflect about my career path and decisions, and I wonder if just the fact that I'm a woman makes them interesting. I hope not.]]> 2021-03-12T15:15:23+00:00 https://www.cybereason.com/blog/why-be-daring www.secnews.physaphae.fr/article.php?IdArticle=2474470 False None None None CybeReason - Vendor blog Live Feeds of 150K Surveillance Cameras Compromised in Verkada Breach Live Feeds of 150K Surveillance Cameras Compromised in Verkada Breach Digital attackers compromised the live feeds of 150,000 surveillance cameras made by enterprise security camera system manufacturer Verkada. According to Bloomberg News, a hacking collective that calls itself “Advanced Persistent Threat 69420” gained access to Verkada by misusing a “Super Admin” account at the company.]]> 2021-03-11T17:36:05+00:00 https://www.cybereason.com/blog/live-feeds-of-150k-surveillance-cameras-compromised-in-verkada-breach www.secnews.physaphae.fr/article.php?IdArticle=2468907 False Threat None None CybeReason - Vendor blog International Women\'s Day: Girls Should Never Give Up International Women's Day: Girls Should Never Give Up “What do you want to be one day, Jean?” ]]> 2021-03-11T13:38:02+00:00 https://www.cybereason.com/blog/international-womens-day-girls-should-never-give-up www.secnews.physaphae.fr/article.php?IdArticle=2468129 False None None None CybeReason - Vendor blog CISO Stories Podcast: Your Job is to Make Cybersecurity Simple CISO Stories Podcast: Your Job is to Make Cybersecurity Simple The CISO position in some organizations is relatively new, but the role has actually been evolving over the past 25 years - ever since Citibank named the first CISO, Steve Katz, in 1995. Join this podcast to learn how Steve navigated the early days of security and the changes he sees in the role today...]]> 2021-03-10T15:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-your-job-is-to-make-cybersecurity-simple www.secnews.physaphae.fr/article.php?IdArticle=2462047 False None None None CybeReason - Vendor blog International Women\'s Day: “Win as One” Takes True Commitment to Diversity International Women's Day: “Win as One” Takes True Commitment to Diversity “As a woman...” I haven't really used that phrase for very long. Eight years ago, I came out as a transgender woman, very late in life. And even today I find myself fighting forty years of my own preconceived notions of what I had to be in order to say those words. ]]> 2021-03-10T14:00:00+00:00 https://www.cybereason.com/blog/international-womens-day-win-as-one-takes-true-commitment-to-diversity www.secnews.physaphae.fr/article.php?IdArticle=2461774 False None None None CybeReason - Vendor blog International Women\'s Day: Culture Add Over Culture Fit as a Catalyst for Diversity International Women's Day: Culture Add Over Culture Fit as a Catalyst for Diversity Having worked in Human Resources my entire career, the notion of Culture Fit  became near and dear to me throughout my career. Leadership teams would comment on needing to hire those who were a Culture Fit, hiring managers would request it, and recruiters would screen hundreds of candidates to try to ensure the people they presented truly fit the company's culture. ]]> 2021-03-09T15:00:00+00:00 https://www.cybereason.com/blog/international-womens-day-culture-add-over-culture-fit-as-a-catalyst-for-diversity www.secnews.physaphae.fr/article.php?IdArticle=2456582 False Guideline None None CybeReason - Vendor blog Cybereason Expands in the DACH Region with Bechtle AG Partnership Cybereason Expands in the DACH Region with Bechtle AG Partnership Cybereason is pleased to announce a strategic partnership with Bechtle AG to facilitate expansion across the DACH region of Germany, Austria and Switzerland to better protect enterprises against sophisticated cyber attacks on endpoints and everywhere in their networks.]]> 2021-03-09T14:00:00+00:00 https://www.cybereason.com/blog/cybereason-expands-in-the-dach-region www.secnews.physaphae.fr/article.php?IdArticle=2456381 False None None None CybeReason - Vendor blog HAFNIUM and SolarWinds Attacks Highlight Lack of Accountability SolarWinds supply chain attacks, organizations are again scrambling to assess the impact of a recently disclosed attack attributed to the Chinese state-sponsored HAFNIUM APT group that targets vulnerabilities in Microsoft Exchange servers with two zero-day exploits. Perhaps it's time we accept that there's a war going on, and that this war is being fought on the backs of commercial companies who are targeted by sophisticated, military-grade offensive campaigns.]]> 2021-03-08T20:27:29+00:00 https://www.cybereason.com/blog/hafnium-and-solarwinds-attacks-highlight-lack-of-accountability www.secnews.physaphae.fr/article.php?IdArticle=2453255 False None None None CybeReason - Vendor blog International Women\'s Day: UbU and Lead Like a Girl International Women's Day: UbU and Lead Like a Girl Rewind to 2012: Sheryl Sandberg's Lean In had just been published, pushing women to stop sitting back and start taking more risks. Amy Cuddy had just come out with her “Power Pose” TED Talk telling women that posing like Superwoman for two minutes can make you feel more powerful. ]]> 2021-03-08T14:00:00+00:00 https://www.cybereason.com/blog/international-womens-day-ubu-and-lead-like-a-girl www.secnews.physaphae.fr/article.php?IdArticle=2451321 False Guideline None None CybeReason - Vendor blog CISO Stories Podcast: …and Other Useless Security Constructs CISO Stories Podcast: …and Other Useless Security Constructs Bob Bigman, former CISO for the CIA, simplifies the conversation by slaughtering some of the industry's most sacred cows like risk tolerance as a key driver for security programs - check it out…]]> 2021-03-04T14:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-and-other-useless-security-constructs www.secnews.physaphae.fr/article.php?IdArticle=2433541 False None None None CybeReason - Vendor blog Malicious Life Podcast: Inside NotPetya, Part 1 Malicious Life Podcast: Inside NotPetya, Part 1 On June 28th, 2017, millions of Ukrainians were celebrating Constitution Day. Their national holiday turned into a nightmare, as tens of thousands of computers all over the country were infected by mysterious malware. By that afternoon, the cyber-pandemic was already going global.]]> 2021-03-03T14:00:00+00:00 http://www.cybereason.com/blog/malicious-life-podcast-inside-notpetya-ransomware-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2428397 False None NotPetya None CybeReason - Vendor blog Defender Spotlight: Keith Barros, Seton Hall University Defender Spotlight: Keith Barros, Seton Hall University Top-tier defender Keith Barros of Seton Hall University discusses the successes SHU has achieved with a deployment of Cybereason solutions to secure endpoints and ramp-up students to Level1 Analyst level performance.]]> 2021-03-02T14:29:11+00:00 https://www.cybereason.com/blog/defender-spotlight-keith-barros-seton-hall-university www.secnews.physaphae.fr/article.php?IdArticle=2422701 False None None None CybeReason - Vendor blog CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own The CISO must interact with many different groups within the company. These groups differ in the amount of business acumen and technical depth necessary. The CISO must have self-awareness of how to approach each of these different types of stakeholders, as well as ensuring appropriate self-care is taken to limit burnout, stress and anxiety.]]> 2021-03-01T14:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-without-building-a-ciso-eq-you-may-be-on-your-own www.secnews.physaphae.fr/article.php?IdArticle=2416911 False None None None CybeReason - Vendor blog CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights Eric Schmidt (CEO Google 2001-2007) famously noted that his company's policy was to get 'right up to the creepy line and not cross it.' The closer an organization can get to this imaginary line, the greater the profit maximization. When does this become an invasion of privacy? ]]> 2021-02-25T14:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-doing-privacy-right-vs.-doing-privacy-rights www.secnews.physaphae.fr/article.php?IdArticle=2398195 False None None None CybeReason - Vendor blog More Money Won\'t Prevent the Next SolarWinds - But Better Detection Strategies Will More Money Won't Prevent the Next SolarWinds - But Better Detection Strategies Will The SolarWinds supply chain attacks aren't out of the news yet - not by a longshot. Now is when we're starting to see the U.S. government implement changes in response to the incident.]]> 2021-02-24T14:00:00+00:00 https://www.cybereason.com/blog/more-money-wont-prevent-the-next-solarwinds-but-better-detection-strategies-will www.secnews.physaphae.fr/article.php?IdArticle=2392718 False None None None CybeReason - Vendor blog Cybereason Accelerates North American Expansion with Strategic Hires Cybereason Accelerates North American Expansion with Strategic Hires Cybereason is pleased to announce further expansion in North America with the addition of cybersecurity leaders Abigail Maines as Vice President of Commercial and Channel Sales, Stephan Tallent as Vice President of Managed Security Services Providers, and Ahmed Saleh as Vice President of Incident Response Services. ]]> 2021-02-23T14:05:00+00:00 https://www.cybereason.com/blog/cybereason-accelerates-north-american-expansion-with-strategic-hires www.secnews.physaphae.fr/article.php?IdArticle=2388046 False Guideline None None CybeReason - Vendor blog Case Study: SCM Insurance Services Finds True Partnership Cybereason Case Study: SCM Insurance Services Finds True Partnership Cybereason SCM Insurance Services has been supporting the insurance and risk management community for more than 30 years with over 200 locations and over 3,000 employees across North America providing claims adjusting, third-party administration (TPA), risk management, investigative, surveillance, risk mitigation, medical services, forensic services (accounting/engineering), and risk intelligence. ]]> 2021-02-23T14:00:00+00:00 https://www.cybereason.com/blog/case-study-scm-insurance-services-finds-true-partnership-cybereason www.secnews.physaphae.fr/article.php?IdArticle=2388047 False None None None CybeReason - Vendor blog Ransomware Attacks Remain Persistent and Pervasive Ransomware Attacks Remain Persistent and Pervasive Ransomware has been the scourge of businesses for some time now, and it doesn't seem that there is an end in sight where the impact to business is concerned.]]> 2021-02-22T13:45:00+00:00 https://www.cybereason.com/blog/ransomware-attacks-remain-persistent-and-pervasive www.secnews.physaphae.fr/article.php?IdArticle=2382445 False None None None CybeReason - Vendor blog Kia Motors America: Ransomware Not Behind Extended Systems Outage Kia Motors America: Ransomware Not Behind Extended Systems Outage Kia Motors America stated that a ransomware attack was not the apparent cause of an extended systems outage affecting the automobile dealer's IT systems. It all started with an error message…]]> 2021-02-19T13:40:58+00:00 https://www.cybereason.com/blog/kia-motors-america-ransomware-not-behind-extended-systems-outage www.secnews.physaphae.fr/article.php?IdArticle=2371058 False Ransomware None None CybeReason - Vendor blog Cybereason Expands Middle East and North Africa Presence with Dubai\'s Oxygen Cybereason Expands Middle East and North Africa Presence with Dubai's Oxygen Cybereason is pleased to announce a partnership with Oxygen DMCC, the Dubai-based leader in AI-powered cybersecurity and mobility solutions, enabling enterprises across the Middle East and North Africa (MENA) to detect and end cyber attacks on endpoints anywhere on their networks.]]> 2021-02-18T14:00:00+00:00 https://www.cybereason.com/blog/cybereason-expands-middle-east-and-north-africa-presence-with-dubais-oxygen www.secnews.physaphae.fr/article.php?IdArticle=2365874 False Guideline None None CybeReason - Vendor blog Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 2 Malicious Life Podcast: Should Law Enforcement Use Facial Recognition? Pt. 2 It seems likely that legislation alone won't be able to regulate the widespread use of facial recognition. However, placing AI in the hands of law enforcement or the government does have its dangers due to the limitations of the technology itself and the biases of the officers who use it.]]> 2021-02-17T20:19:15+00:00 https://www.cybereason.com/blog/malicious-life-podcast-inside-clearview-ai-facial-recognition-0-0 www.secnews.physaphae.fr/article.php?IdArticle=2362649 False None None None CybeReason - Vendor blog Global Law Firm Attributes Data Breach to Compromise at File Sharing Provider Global Law Firm Attributes Data Breach to Compromise at File Sharing Provider An international law firm attributed a data breach to a compromise at a cloud solutions company that provides file-sharing services. According to the Wall Street Journal, a threat actor claimed to have stolen data from global law firm Jones Day and published that information on the dark web.]]> 2021-02-17T18:35:26+00:00 https://www.cybereason.com/blog/global-law-firm-attributes-data-breach-to-compromise-at-file-sharing-provider www.secnews.physaphae.fr/article.php?IdArticle=2362105 False Data Breach,Threat None None