www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2025-05-10T12:23:32+00:00 www.secnews.physaphae.fr CybeReason - Vendor blog Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 3 Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 3 In this third installment of the series (Part 1, Part 2), we come back to the story in early 2007 when a Secret Service agent operating out of San Diego takes a flight halfway across the world. He's going to meet with Europe's most prolific stolen credit card salesman. It is this meeting that will be the beginning of the end for Albert Gonzalez and his 'All Star' crew of hackers, international businessmen and mules.]]> 2021-07-26T12:01:59+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-3 www.secnews.physaphae.fr/article.php?IdArticle=3133596 False None None None CybeReason - Vendor blog CISO Stories Podcast: Protecting the Crown Jewels CISO Stories Podcast: Protecting the Crown Jewels The crown jewels are those assets representing the highest value to the organization and deserve the greatest investment to protect. Join this podcast with special guest Steve Durbin, Chief Executive at ISF, to learn the importance of protecting these assets throughout the information life cycle - check it out...]]> 2021-07-22T13:06:52+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-protecting-the-crown-jewels www.secnews.physaphae.fr/article.php?IdArticle=3111957 False None None None CybeReason - Vendor blog Cybereason and CYDERES Partner to Deliver Managed Detection and Response Cybereason and CYDERES Partner to Deliver Managed Detection and Response Cybereason is thrilled to announce a strategic partnership with CYDERES, the security-as-a-service division of Fishtech Group and a Top 25 MSSP, to bring enhanced Managed Detection and Response (MDR) to our current and future managed security customers. ]]> 2021-07-22T12:00:00+00:00 https://www.cybereason.com/blog/cybereason-and-cyderes-partner-to-deliver-managed-detection-and-response www.secnews.physaphae.fr/article.php?IdArticle=3111195 False None None None CybeReason - Vendor blog Everything Cybereason at the Black Hat 2021 Virtual Conference Everything Cybereason at the Black Hat 2021 Virtual Conference The Cybereason team is excited to have you join us at Black Hat 2021 on August 4th from 8:30AM to 5PM PST, and on August 5th from 8:30AM to 4PM PST! Stop by the “virtual” Cybereason booth and automatically be entered to win a Sonos Roam Speaker and other great freebies! ]]> 2021-07-21T20:34:32+00:00 https://www.cybereason.com/blog/everything-cybereason-at-the-black-hat-2021-virtual-conference www.secnews.physaphae.fr/article.php?IdArticle=3107739 False None None None CybeReason - Vendor blog Three Ransomware Attacks that Upped the Ante Three Ransomware Attacks that Upped the Ante Concern surrounding ransomware attacks is high in the security industry. In our recent global research report titled Ransomware: The True Cost to Business, we found that 81% of the 1,200+ cybersecurity professionals we surveyed were highly or very concerned about the risk of ransomware.]]> 2021-07-21T13:43:27+00:00 https://www.cybereason.com/blog/three-ransomware-attacks-that-upped-the-ante www.secnews.physaphae.fr/article.php?IdArticle=3105607 False Ransomware None None CybeReason - Vendor blog Cybereason Enhances XDR Offering with empow Acquisition Cybereason Enhances XDR Offering with empow Acquisition Today's targeted attacks increasingly take aim at multiple devices and users simultaneously while employing a range of tactics, techniques and procedures (TTPs). To further complicate the work of the defender, traditional security solutions are alert-centric, generating an ever-growing volume of notifications that lack context and fail to correlate to one another even if part of the same attack. This alert-centric, siloed approach gives attackers ample opportunity to hide in the seams, which makes hunting, tracking and eliminating attackers all but impossible. ]]> 2021-07-20T09:00:00+00:00 https://www.cybereason.com/blog/cybereason-enhances-xdr-offering-with-empow-acquisition www.secnews.physaphae.fr/article.php?IdArticle=3099431 False None None None CybeReason - Vendor blog Malicious Life Podcast: Dave Kennedy on the History of DerbyCon Malicious Life Podcast: Dave Kennedy on the History of DerbyCon DerbyCon was conceived with the notion that it was going to be all about making the security community a family. Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never listen to a Busta Rhymes album again - check it out…]]> 2021-07-19T12:04:11+00:00 https://www.cybereason.com/blog/malicious-life-podcast-dave-kennedy-on-the-history-of-derbycon www.secnews.physaphae.fr/article.php?IdArticle=3092967 False None None None CybeReason - Vendor blog Cybereason vs. Prometheus Ransomware Thanos ransomware that is operated independently by the Prometheus group, and was first observed in February of 2021. In just a short period of time, Prometheus caused a lot of damage, and breached over 40 companies.]]> 2021-07-15T12:15:00+00:00 https://www.cybereason.com/blog/cybereason-vs.-prometheus-ransomware www.secnews.physaphae.fr/article.php?IdArticle=3070780 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: Always be a Student - Always be Learning CISO Stories Podcast: Always be a Student - Always be Learning Phil Attfield, CEO and founder at Sequitur Labs, discusses his engineering roots and the natural curiosity that led him to developing software tools and in-house products for modeling, synthesis and verification of telecom and network equipment hardware at Nortel.]]> 2021-07-15T12:00:00+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-always-be-a-student-always-be-learning www.secnews.physaphae.fr/article.php?IdArticle=3070576 False None None None CybeReason - Vendor blog Cybereason Extends Global Leadership in XDR with $275 Million in Crossover Financing Cybereason Extends Global Leadership in XDR with $275 Million in Crossover Financing The first half of 2021 has seen explosive growth for our company, and the tremendous momentum we are enjoying is just the beginning of what will prove to be a momentous year for the entire Cybereason team. ]]> 2021-07-14T12:46:09+00:00 https://www.cybereason.com/blog/cybereason-extends-global-leadership-in-xdr-with-275-million-in-crossover-financing www.secnews.physaphae.fr/article.php?IdArticle=3064116 False Guideline None None CybeReason - Vendor blog Cybereason Launches Global Defenders League Partner Program Cybereason Launches Global Defenders League Partner Program The Cybereason team is excited to announce the launch of the Cybereason Defenders League, a Global Partner community, designed to reward the cybersecurity industry's most trusted advisors and solution providers by increasing their margins and profitability. Members of this program will gain access to award-winning technology and services to help end users stop cyber attacks. ]]> 2021-07-13T12:58:13+00:00 https://www.cybereason.com/blog/cybereason-launches-global-defenders-league-partner-program www.secnews.physaphae.fr/article.php?IdArticle=3057291 False None None None CybeReason - Vendor blog CISO Roundtable: Ransomware Attacks and the True Cost to Business CISO Roundtable: Ransomware Attacks and the True Cost to Business A recent global research report conducted by Cybereason, titled Ransomware: The True Cost to Business, revealed that the vast majority of organizations that have suffered a ransomware attack have experienced significant impact to the business, including loss of revenue, damage to the organization's brand, unplanned workforce reductions, and little in the way of relief from cyber insurance policies. ]]> 2021-07-12T18:56:52+00:00 https://www.cybereason.com/blog/ciso-roundtable-ransomware-attacks-and-the-true-cost-to-business www.secnews.physaphae.fr/article.php?IdArticle=3053326 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2 Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2 In this second installment of the series (listen to Albert Gonzales Part 1 here), Gonzales is working with the Secret Service and apparently doing an outstanding job. He was such a good employee, in fact, that they had him doing seminars for staff and speaking at government-run conferences. At one point he met personally with the (then) Director of the Secret Service where Gonzales gave a presentation and even got to shake the Director's hand.]]> 2021-07-12T12:06:30+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-2 www.secnews.physaphae.fr/article.php?IdArticle=3051906 False None None None CybeReason - Vendor blog Cybereason and Doosan Corp Partner to Secure APAC Enterprises Cybereason and Doosan Corp Partner to Secure APAC Enterprises Cybereason is excited to announce a partnership with South Korean multinational conglomerate and Global Fortune 2000 leader the Doosan Corporation (Doosan Digital Innovation, or DDI) to protect enterprises from sophisticated cyberattacks on endpoints and across their networks. ]]> 2021-07-11T20:30:00+00:00 https://www.cybereason.com/blog/cybereason-and-doosan-corp-partner-to-secure-apac-enterprises www.secnews.physaphae.fr/article.php?IdArticle=3049982 False Guideline None None CybeReason - Vendor blog Summer Webinar Series with CSO Sam Curry Summer Webinar Series with CSO Sam Curry Join Cybereason CSO Sam Curry for this webinar series where he revisits some of the cybersecurity highlights of the first half of 2021, from the SolarWinds supply chain attacks to DarkSide and other major ransomware operations. In this series, Sam covers not just the problems confronting defenders so far this year but also the state of play for major ransomware operations, as well as a look at emerging solutions like XDR (Extended Detection and Response) that are designed to reverse the adversary advantage and return the high ground to the defenders. Register now for one or all of this fascinating summer webinar series:]]> 2021-07-09T14:32:29+00:00 https://www.cybereason.com/blog/summer-webinar-series-with-cso-sam-curry www.secnews.physaphae.fr/article.php?IdArticle=3042637 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: CISO Business Enablement - Getting to Yes CISO Stories Podcast: CISO Business Enablement - Getting to Yes The CISO is often in a position where vulnerabilities are known and implementing a solution may result in an insecure posture. Should the CISO say 'no we can't do that' or 'figure out how to make it happen'? ]]> 2021-07-08T13:29:54+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-ciso-business-enablement-getting-to-yes www.secnews.physaphae.fr/article.php?IdArticle=3037753 False None None None CybeReason - Vendor blog REvil Ransomware Attacks: Implications for Kaseya, MSPs and Businesses REvil Ransomware Attacks: Implications for Kaseya, MSPs and Businesses In some ways, the ransomware attack involving Kaseya is a perfectly logical extension of everything we've seen since the end of last year with the disclosure of the SolarWinds attacks: the merger of supply chain exploits with ransomware to kickstart distribution, an even higher bar for extortions, and the same overall ecosystem at work. In other words, no surprises. ]]> 2021-07-07T20:27:43+00:00 https://www.cybereason.com/blog/revil-ransomware-attacks-implications-for-kaseya-msps-and-businesses www.secnews.physaphae.fr/article.php?IdArticle=3034678 False Ransomware None None CybeReason - Vendor blog Cybereason vs. REvil Ransomware: The Kaseya Chronicles Cybereason vs. REvil Ransomware: The Kaseya Chronicles As a spate of ransomware attacks continue to dominate the headlines in recent months, the infamous REvil ransomware gang has upped the ante significantly with a wide ranging operation that is suspected to have impacted thousands of small-to-midsize businesses through the compromise of a leading IT services provider.]]> 2021-07-06T15:45:16+00:00 https://www.cybereason.com/blog/cybereason-vs-revil-ransomware-the-kaseya-chronicles www.secnews.physaphae.fr/article.php?IdArticle=3028569 False Ransomware,Guideline None None CybeReason - Vendor blog Malicious Life Podcast: Jeff Moss on the History of DEF CON Malicious Life Podcast: Jeff Moss on the History of DEF CON Jeff Moss, founder of the DEF CON Hacker conference (as well as Black Hat), discusses the origins of DEF CON, its "interesting relationship” with law enforcement and intelligence agencies, and some of the notable shenanigans the conference attendees pulled off over the years - check it out…]]> 2021-07-06T14:17:09+00:00 https://www.cybereason.com/blog/malicious-life-podcast-jeff-moss-on-the-history-of-def-con www.secnews.physaphae.fr/article.php?IdArticle=3028334 False None None None CybeReason - Vendor blog CISO Stories Podcast: Why Relationships Matter if You Want to Elevate Security CISO Stories Podcast: Why Relationships Matter if You Want to Elevate Security Communication in any organization can be a challenge, especially when working with different levels of government and various funding mechanisms. ]]> 2021-07-01T09:28:08+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-why-relationships-matter-if-you-want-to-elevate-security www.secnews.physaphae.fr/article.php?IdArticle=3005053 False None None None CybeReason - Vendor blog What SMBs Need to Know about Ransomware Attacks What SMBs Need to Know about Ransomware Attacks Ransomware attacks are on the rise. A recently released report by Cybereason, titled Ransomware: The True Cost to Business, detailed how malicious actors are fine-tuning their ransomware campaign tactics, and how both the frequency and severity of successful ransomware attacks have tremendous impact on victim organizations and their ability to conduct business.]]> 2021-06-30T13:33:56+00:00 https://www.cybereason.com/blog/what-smbs-need-to-know-about-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=3000677 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1 Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1 It was as a teenager that Albert Gonzalez, one of the greatest cybercriminals in history, developed the obsession that would go on to ruin his life. Gonzalez and some of his friends would go on to pull off some of the most remarkable crimes in the history of computers - but they just didn't know when to stop. If they did, they might have gotten away with it, and they might not have ruined their lives.]]> 2021-06-28T14:08:06+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-life-and-exploits-of-albert-gonzales-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2991524 False None None None CybeReason - Vendor blog Ransomware Attacks: Will G7 and Biden-Putin Summits Prove Fruitful? Ransomware Attacks: Will G7 and Biden-Putin Summits Prove Fruitful? I've been very busy lately. Between the back-to-back ransomware attacks and the release of our ransomware report highlighting the impact on business from ransomware attacks, I have been asked to share my thoughts and insights on a variety of broadcast and print media outlets. ]]> 2021-06-25T22:54:59+00:00 https://www.cybereason.com/blog/ransomware-attacks-will-g7-and-biden-putin-summits-prove-fruitful www.secnews.physaphae.fr/article.php?IdArticle=2984894 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: Fixing the Talent Shortage - CyberSecurity Talent Initiative CISO Stories Podcast: Fixing the Talent Shortage - CyberSecurity Talent Initiative As threats to the nation's security grow, there remains a substantial shortage of skilled cybersecurity professionals. The federal government and private sector can work together to fill their open positions and attract the next generation of motivated mission-driven cybersecurity leaders.]]> 2021-06-23T12:56:41+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-fixing-the-talent-shortage-cybersecurity-talent-initiative www.secnews.physaphae.fr/article.php?IdArticle=2970917 False Guideline None None CybeReason - Vendor blog Malicious Life Podcast: History of the THOTCON Hacking Conference Malicious Life Podcast: History of the THOTCON Hacking Conference THOTCON is not your ordinary, run-of-the-mill security conference, and it's obvious from the moment you browse their website. How did a local, small-scale event in Chicago grow to become a major cybersecurity conference? What is its connection to The Matrix movie?]]> 2021-06-22T13:07:04+00:00 https://www.cybereason.com/blog/malicious-life-podcast-history-of-the-thotcon-hacking-conference www.secnews.physaphae.fr/article.php?IdArticle=2965458 False None None None CybeReason - Vendor blog XDR: The Key to Higher Education\'s Fight Against Ransomware XDR: The Key to Higher Education's Fight Against Ransomware A single student recently became the conduit for a ransomware attack at a biomolecular institute. According to ZDNet, the attack occurred when a student at the unnamed European organization attempted to find a free version of a data visualization software solution. ]]> 2021-06-21T13:34:19+00:00 https://www.cybereason.com/blog/xdr-the-key-to-higher-educations-fight-against-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2959625 False Ransomware None None CybeReason - Vendor blog CISO Stories Podcast: So You Want to be a Cyber Spy? CISO Stories Podcast: So You Want to be a Cyber Spy? Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way - check it out...]]> 2021-06-17T12:40:51+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-so-you-want-to-be-a-cyber-spy www.secnews.physaphae.fr/article.php?IdArticle=2942291 False None None None CybeReason - Vendor blog Biden-Putin Summit and Why Threat Actors Just Won\'t Give it a Rest Biden-Putin Summit and Why Threat Actors Just Won't Give it a Rest On June 11, McDonald's said in a message to its U.S. employees that it had discovered unauthorized activity on an internal security system. The burger chain responded by bringing on some external consultants to investigate what had happened, reported the Wall Street Journal. ]]> 2021-06-17T12:32:14+00:00 https://www.cybereason.com/blog/biden-putin-summit-and-why-threat-actors-just-wont-give-it-a-rest www.secnews.physaphae.fr/article.php?IdArticle=2942292 False Threat None None CybeReason - Vendor blog Report: Ransomware Attacks and the True Cost to Business Report: Ransomware Attacks and the True Cost to Business Ransomware attacks have continued to make headlines, and for good reason: on average, there is a new ransomware attack every 11 seconds, and the losses to organizations from ransomware attacks is projected to reach $20 billion over the course of 2021 following a record increase in losses of more than 225% in 2020. So what is the true cost to businesses who have been impacted by a ransomware attack?]]> 2021-06-16T04:04:05+00:00 https://www.cybereason.com/blog/report-ransomware-attacks-and-the-true-cost-to-business www.secnews.physaphae.fr/article.php?IdArticle=2933258 False Ransomware None None CybeReason - Vendor blog Russia\'s Offer to Extradite Attackers - and a Grain of Salt Russia's Offer to Extradite Attackers - and a Grain of Salt President Vladimir Putin said that Russia would be willing to hand over cyber criminals to the United States if Washington agreed to reciprocate. According to Reuters, Putin disclosed his country's willingness to work with the United States on prosecuting cyber criminals in an interview aired by state television over the weekend.]]> 2021-06-15T15:00:00+00:00 https://www.cybereason.com/blog/russias-offer-to-extradite-attackers-and-a-grain-of-salt www.secnews.physaphae.fr/article.php?IdArticle=2930527 False None None None CybeReason - Vendor blog Deja Vu: What Do NotPetya and SolarWinds Have in Common? Deja Vu: What Do NotPetya and SolarWinds Have in Common? As I was waking up in Boston on the morning of June 27, 2017, reports were being shared on social media that an electric power supplier in Ukraine was hit by a cyber attack. Within about an hour, a Danish power supplier was also knocked offline and Maersk shipping announced that it was affected as well. By the time I arrived at my desk, companies around the world were shut down by the same attack--which Symantec declared as Petya ransomware. It was going to be a busy and interesting day. ]]> 2021-06-15T13:46:35+00:00 https://www.cybereason.com/blog/deja-vu-what-do-notpetya-and-solarwinds-have-in-common www.secnews.physaphae.fr/article.php?IdArticle=2929413 False None NotPetya,NotPetya None CybeReason - Vendor blog Malicious Life Podcast: China\'s Unrestricted Cyberwarfare Part 3 Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 3 For more than a decade, China orchestrated a sophisticated espionage campaign against Nortel Networks, using Huawei, Chinese civilians working in Canada, and even organized crime gangs to steal important technical and operational information. When Nortel finally fell, the Chinese were there to reap the rewards of their death.]]> 2021-06-15T12:56:41+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-3 www.secnews.physaphae.fr/article.php?IdArticle=2929150 False None None None CybeReason - Vendor blog Ransomware Attacks are Evolving: What You Need to Know Ransomware Attacks are Evolving: What You Need to Know One look at all the ransomware attacks from the past few years, and it's clear that crypto-malware actors are attempting to maximize their financial gain. We've observed these threat groups using multiple techniques to profit even more off their victims than in years past. Here are a few tactics that stood out to us. ]]> 2021-06-14T11:59:48+00:00 https://www.cybereason.com/blog/ransomware-attacks-are-evolving-what-you-need-to-know www.secnews.physaphae.fr/article.php?IdArticle=2922351 False Ransomware,Threat None None CybeReason - Vendor blog CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again! CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again! We want to trust our employees and contractors working within our organizations. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? ]]> 2021-06-09T13:23:33+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-cisos-no-insider-cybersecurity-risk-guess-again www.secnews.physaphae.fr/article.php?IdArticle=2896096 False None None None CybeReason - Vendor blog DOJ Recovers $2.3M in Bitcoin Ransom Paid by Colonial Pipeline DOJ Recovers $2.3M in Bitcoin Ransom Paid by Colonial Pipeline Investigators recovered $2.3 million in bitcoin paid by the Colonial Pipeline Company to DarkSide following a ransomware attack in early May. On June 7, the Department of Justice (DOJ) revealed that law enforcement agencies had been tracking transfers of bitcoin when they spotted the movement of 63.7 bitcoins associated with the Colonial Pipeline Company's ransom payment.]]> 2021-06-08T20:14:43+00:00 https://www.cybereason.com/blog/doj-recovers-2.3m-in-bitcoin-ransom-paid-by-colonial-pipeline www.secnews.physaphae.fr/article.php?IdArticle=2892554 False None None None CybeReason - Vendor blog Webinar: Live Ransomware Attack Simulation Webinar: Live Ransomware Attack Simulation If you're concerned about ransomware, whether it's beating REvil or DarkSide, stopping data exfiltration, or preventing the latest trend of double extortion, this session is for you! Join us for a live ransomware attack simulation, where we'll discuss the latest attack trends, walk through a multi-stage ransomware attack. ]]> 2021-06-08T18:47:33+00:00 https://www.cybereason.com/blog/webinar-live-ransomware-attack-simulation www.secnews.physaphae.fr/article.php?IdArticle=2892003 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack On Friday, May 7th, 2021, Colonial Pipeline suffered a cyberattack that forced the company to shut down its operations. As a result, gasoline outages were reported across the U.S. East Coast.]]> 2021-06-08T13:25:12+00:00 https://www.cybereason.com/blog/malicious-life-podcast-inside-the-darkside-colonial-pipeline-attack www.secnews.physaphae.fr/article.php?IdArticle=2890464 False None None None CybeReason - Vendor blog Market Drivers for XDR and MSSP Service Opportunities Market Drivers for XDR and MSSP Service Opportunities In my last article, we looked at how to define Extended Detection and Response (XDR) solutions from an MSSP perspective and where it fits in as part of an overall Managed Detection and Response (MDR) service offering.]]> 2021-06-07T12:14:36+00:00 https://www.cybereason.com/blog/market-drivers-for-xdr-and-mssp-service-opportunities www.secnews.physaphae.fr/article.php?IdArticle=2885324 False None None None CybeReason - Vendor blog CISO Stories Podcast: CISOs Cross the Bridge to the Cloud CISO Stories Podcast: CISOs Cross the Bridge to the Cloud Today, most organizations have moved some or all of their workloads to the cloud.This migration provides opportunities of scale, flexibility and speed, but the data moves further away from the physical control of the organization.]]> 2021-06-03T12:56:16+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-cisos-cross-the-bridge-to-the-cloud www.secnews.physaphae.fr/article.php?IdArticle=2871831 False None None None CybeReason - Vendor blog Cybereason vs. REvil Ransomware Cybereason vs. REvil Ransomware According to reports, meatpacking giant JBS was hit with a serious attack reportedly involving REvil ransomware, shutting down a good portion of the company's production capabilities and threatening to create supply chain disruptions and sharp cost of goods increases.]]> 2021-06-02T18:46:55+00:00 https://www.cybereason.com/blog/cybereason-vs.-revil-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2869704 False Ransomware None None CybeReason - Vendor blog Cybereason Joins with MITRE Engenuity\'s Center for Threat-Informed Defense Cybereason Joins with MITRE Engenuity's Center for Threat-Informed Defense Cybereason is excited to announce that it is now a research sponsor of the Center for Threat-Informed Defense, allowing collaboration on applied research and development to improve cyber defenses at scale for the global security community.]]> 2021-06-02T12:01:43+00:00 https://www.cybereason.com/blog/cybereason-joins-with-mitre-engenuitys-center-for-threat-informed-defense www.secnews.physaphae.fr/article.php?IdArticle=2868059 False None None None CybeReason - Vendor blog SolarWinds Threat Actors Behind New Email Attack Campaign SolarWinds Threat Actors Behind New Email Attack Campaign The threat actors behind last year's SolarWinds supply chain attack have launched a new email attack campaign aimed at organizations around the world. This attack wave attracted the attention of the Microsoft Threat Intelligence Center (MSTIC) on May 25. ]]> 2021-06-01T16:53:30+00:00 https://www.cybereason.com/blog/solarwinds-threat-actors-behind-new-email-attack-campaign www.secnews.physaphae.fr/article.php?IdArticle=2865541 False Threat None None CybeReason - Vendor blog The Line in the Sand: How We Respond Today Impacts Our Security Tomorrow The Line in the Sand: How We Respond Today Impacts Our Security Tomorrow In the past few months, we've faced massive attacks with SolarWinds and the HAFNIUM attacks targeting Microsoft Exchange, followed by the unprecedented ransomware attack by DarkSide that crippled US critical infrastructure. It is time to ask ourselves again, what is really going on? More importantly, the time has come for the United States government to do some soul searching on why defenses have failed and how we can prevent similar attacks in the future. ]]> 2021-06-01T12:51:20+00:00 https://www.cybereason.com/blog/the-line-in-the-sand-how-we-respond-today-impacts-our-security-tomorrow www.secnews.physaphae.fr/article.php?IdArticle=2865542 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: China\'s Unrestricted Cyberwarfare Part 2 Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 2 In China's Unrestricted Cyberwarfare Part 1 we explored the story of two Chinese military officers, veterans of the semi-conflict with Taiwan, who helped shape the role of cyber in modern warfare in China and beyond with special guest Lieutenant Colonel, USMC (retired) Bill Hagestad, a leading international authority on cyberwarfare and Chinese cyber operations and capabilities specifically.]]> 2021-06-01T12:13:07+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-2 www.secnews.physaphae.fr/article.php?IdArticle=2865543 False Guideline None None CybeReason - Vendor blog XDR: Moving Beyond the Limits of SIEM and SOAR XDR: Moving Beyond the Limits of SIEM and SOAR Organizations around the world are under siege from cyberattacks, and they need tools that can protect against malware, exploits, and increasingly sophisticated attacks on both devices and users. SIEM, SOAR and EDR technologies all have their benefits, but organizations with mature security programs are looking to move beyond the limits of these offerings - that's where the advent of XDR comes into play.]]> 2021-05-27T12:51:11+00:00 https://www.cybereason.com/blog/xdr-moving-beyound-the-limits-of-siem-and-soar www.secnews.physaphae.fr/article.php?IdArticle=2845909 False None None None CybeReason - Vendor blog Ransomware Trends: Six Notable Ransomware Attacks from 2021 Ransomware Trends: Six Notable Ransomware Attacks from 2021 The security community witnessed triple-digit growth in the number of publicly disclosed ransomware incidents in 2020. As noted in a previous blog post on Five Things You Need to Know About Ransomware Attacks, ransomware attacks grew 715% in H1 2020 compared to the first half of the previous year. Ransomware incidents for 2020 overall increased by more than 150%.]]> 2021-05-26T12:52:12+00:00 https://www.cybereason.com/blog/ransomware-trends-six-notable-ransomware-attacks-from-2022 www.secnews.physaphae.fr/article.php?IdArticle=2840527 False Ransomware None None CybeReason - Vendor blog Cybereason Makes Big Debut on CNBC 2021 Disruptor 50 List Cybereason Makes Big Debut on CNBC 2021 Disruptor 50 List The Cybereason team is thrilled to have been named to the CNBC 2021 Disruptor 50 list of the most disruptive privately-held global companies. Cybereason debuted in the #32 spot and is one of only two cybersecurity companies on the list. Cybereason was chosen from a record number of nearly 1,600 nominations. ]]> 2021-05-25T13:19:15+00:00 https://www.cybereason.com/blog/cybereason-makes-big-debut-on-cnbc-2021-disruptor-50-list www.secnews.physaphae.fr/article.php?IdArticle=2835690 False None None None CybeReason - Vendor blog CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets We have limited investment dollars and therefore must ensure we are protecting the right assets. The practical side of determining “what” needs to be protected and “how” is a convoluted maze of academics, taxonomies, frameworks, and inconsistent approaches.]]> 2021-05-25T12:29:32+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-five-critical-elements-for-protecting-the-right-assets www.secnews.physaphae.fr/article.php?IdArticle=2835506 False None None None CybeReason - Vendor blog New Cybersecurity Executive Order: Will It Have Impact? New Cybersecurity Executive Order: Will It Have Impact? The state of the threat landscape in general, and incidents like the recent ransomware attack against Colonial Pipeline demand that we take immediate action to improve cybersecurity defenses. The recent executive order (EO) on cybersecurity from President Biden is a bold step in the right direction.  ]]> 2021-05-25T12:23:45+00:00 https://www.cybereason.com/blog/new-cybersecurity-executive-order-will-it-have-impact www.secnews.physaphae.fr/article.php?IdArticle=2835507 False Threat None None CybeReason - Vendor blog Record Setting $40M Ransom Paid to Attackers Record Setting $40M Ransom Paid to Attackers CNA, one of the largest U.S. commercial and casualty insurance companies, reportedly met a $40 million ransom demand after suffering a ransomware infection earlier in the year. As of this writing, that's the largest ransom demand ever reported to have been paid by a company following a ransomware attack.]]> 2021-05-24T20:59:01+00:00 https://www.cybereason.com/blog/record-setting-40m-ransom-paid-to-attackers www.secnews.physaphae.fr/article.php?IdArticle=2832778 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Untold Story of the RSA Breach Part 2 Malicious Life Podcast: The Untold Story of the RSA Breach Part 2 In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product, a solution that was in-use by thousands of high-profile clients around the world including the U.S. government and an array of U.S. defense contractors. The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data.  In this second episode (listen to Part 1 here) of the Malicious Life Podcast, host Ran Levy is joined by two former RSA executives who were integral to the company's incident response at the time of the attacks and only recently were released from a 10-year NDA that barred them from discussing the incident. For the first time, they elaborate in detail on how the events unfolded and share the untold story behind one of the most impactful attacks of all time - check it out...]]> 2021-05-24T12:03:41+00:00 https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-2 www.secnews.physaphae.fr/article.php?IdArticle=2830819 True Guideline None None CybeReason - Vendor blog Webinar: XDR or EDR: How Should Your SOC Choose? Webinar: XDR or EDR: How Should Your SOC Choose? If you have doubts in your organisation's ability to identify and defeat modern attackers, you're not alone. We're living in a world where IT infrastructure, attacker trends, and workspace norms are constantly shifting, so it's especially challenging to build a solid security foundation with tested best practices. Companies are struggling to prove effective cybersecurity due to a lack of visibility, a shortage of skilled staff, and challenges matching today's accelerated business pace. ]]> 2021-05-21T13:02:13+00:00 https://www.cybereason.com/blog/webinar-xdr-or-edr-how-should-your-soc-choose www.secnews.physaphae.fr/article.php?IdArticle=2820457 False None None None CybeReason - Vendor blog Malicious Life Podcast: The Untold Story of the RSA Breach Part 1 Malicious Life Podcast: The Untold Story of the RSA Breach Part 1 In March of 2011, security vendor RSA was the target of an attack that compromised sensitive data related to the company's flagship SecureID product. The solution was in-use by thousands of high-profile clients around the world, including the U.S. government and an array of U.S. defense contractors. The company's leadership knew they had been breached in a sophisticated APT-style attack, but it was unknown whether the attackers had gained access to the cryptographic keys needed to decrypt sensitive client data.  In this special episode of the Malicious Life Podcast, host Ran Levy is joined by two former RSA executives who were integral to the company's incident response at the time of the attacks and only recently were released from a 10-year NDA that barred them from discussing the incident. For the first time, they elaborate in detail on how the events unfolded and share the untold story behind one of the most impactful attacks of all time. Ran also talks with Wired Magazine's Andy Greenberg who provides some context on why the RSA breach was such a watershed moment for the security industry. Check out Andy's deep dive on the RSA breach with additional interviews, including thoughts from former RSA CEO Art Coviello.]]> 2021-05-20T10:07:14+00:00 https://www.cybereason.com/blog/the-untold-story-of-the-rsa-breach-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2815513 False Guideline None None CybeReason - Vendor blog Cybereason Experts Take Center Stage at RSA Conference 2021 Cybereason Experts Take Center Stage at RSA Conference 2021 Cybereason is excited to announce that Chief Information Security Officer Israel Barak and Principal Security Advocate Lodrina Cherne are taking center stage at the RSA Conference on Thursday, May 21, in two speaking sessions. ]]> 2021-05-19T14:49:53+00:00 https://www.cybereason.com/blog/cybereason-experts-take-center-stage-at-rsa-conference-2021 www.secnews.physaphae.fr/article.php?IdArticle=2811130 False None None None CybeReason - Vendor blog SC Awards Europe: Cybereason Named Finalist for Best Endpoint Security SC Awards Europe: Cybereason Named Finalist for Best Endpoint Security Cybereason is excited to announce it was named a finalist in the Best Endpoint Security category of the 2021 SC Awards Europe competition. Winners will be announced June 8, 2021. Earlier this year, Cybereason was named a finalist for Best Enterprise Security product with SC Awards U.S.]]> 2021-05-19T13:52:17+00:00 https://www.cybereason.com/blog/sc-awards-europe-cybereason-named-finalist-for-best-endpoint-security www.secnews.physaphae.fr/article.php?IdArticle=2810966 False None None None CybeReason - Vendor blog Evaluating XDR Against EDR, SIEM and SOAR Solutions Evaluating XDR Against EDR, SIEM and SOAR Solutions XDR, shorthand for the emerging Extended Detection and Response solution offerings, has quickly established itself as one of the best options for defending the modern enterprise IT infrastructure against cyberattacks. But many are still trying to wrap their minds around XDR and where exactly it fits compared to other established solutions like SIEM, SOAR, and EDR.]]> 2021-05-19T12:44:56+00:00 https://www.cybereason.com/blog/evaluating-xdr-against-edr-siem-and-soar-solutions www.secnews.physaphae.fr/article.php?IdArticle=2810422 False None None None CybeReason - Vendor blog Unpacking the Gartner Critical Capabilities Research Unpacking the Gartner Critical Capabilities Research The importance of third-party research and testing cannot be overstated in the current security marketscape. Important details for consideration when evaluating a solution to onboard for detection and response can be obscure and difficult to clearly understand. Vendors will always position themselves in as positive of a light as possible, which can lead to frustration and head-scratching during the evaluation process.]]> 2021-05-18T12:46:12+00:00 https://www.cybereason.com/blog/unpacking-the-gartner-critical-capabilities-research www.secnews.physaphae.fr/article.php?IdArticle=2804851 False Guideline None None CybeReason - Vendor blog CISO Stories Podcast: Passion for Solving Problems is Key to Security CISO Stories Podcast: Passion for Solving Problems is Key to Security Will Lin, founding team member at ForgePoint Capital and co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch, as well as his work supporting CISOs through collaboration and knowledge sharing - check it out...]]> 2021-05-18T12:42:37+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-passion-for-solving-problems-is-key-to-security www.secnews.physaphae.fr/article.php?IdArticle=2804852 False None None None CybeReason - Vendor blog DarkSide Gang and the New Golden Age of Piracy DarkSide Gang and the New Golden Age of Piracy Late on Friday May 7, 2021, Colonial Pipeline, the company that runs the largest gasoline pipeline in the US, shut down operations following a ransomware attack on their systems. It later emerged that a relatively new ransomware-as-a-service criminal organization known as DarkSide was behind the attack - but there was a twist.]]> 2021-05-17T13:48:43+00:00 https://www.cybereason.com/blog/darkside-gang-and-the-new-golden-age-of-piracy www.secnews.physaphae.fr/article.php?IdArticle=2799740 False Ransomware None None CybeReason - Vendor blog Solving the Ransomware Crisis Solving the Ransomware Crisis Ransomware attacks are trivial to execute and there is little, if any, risk and no penalties for the attackers. As a victim, there are no good choices once an organization is hit by ransomware. You can ignore the ransom demand and restore your data from backups and take your chances with the risk of data exposure. At the same time, the reality is that it doesn't pay to pay--it is not a guarantee that you will get all of the data back in a usable state. In addition, when you pay the ransom you are essentially funding these criminals who are acting as terrorists. The chances are that you are funding additional research and development of the next exploit or ransomware variant, so paying the ransom just makes the problem bigger. Organizations that pay the ransom also risk putting a bullseye on their backs-making themselves attractive targets for future ransomware attacks because they have established that they're willing to pay. The only good option is to avoid having your data stolen or encrypted in the first place, which is why it needs to be a global priority to solve this crisis.]]> 2021-05-14T20:21:22+00:00 https://www.cybereason.com/blog/solving-the-ransomware-crisis www.secnews.physaphae.fr/article.php?IdArticle=2788676 False Ransomware None None CybeReason - Vendor blog Webinar: Future-Proofing Security Programs in 2021 and Beyond Webinar: Future-Proofing Security Programs in 2021 and Beyond 2020 was a year of learning, with surges in ransomware, nation states infecting supply chains from Solar Winds to Microsoft, and radical new work models that might presage a “new normal.” ]]> 2021-05-14T18:46:10+00:00 https://www.cybereason.com/blog/webinar-future-proofing-security-programs-in-2021-and-beyond www.secnews.physaphae.fr/article.php?IdArticle=2787988 False None None None CybeReason - Vendor blog CISO Stories Podcast: Effective Health Care Security is More Than HIPAA CISO Stories Podcast: Effective Health Care Security is More Than HIPAA Healthcare security today is extremely complex due to the integrated clinical systems and connected community networks. As well, no longer are the medical records stored with a single provider. ]]> 2021-05-13T13:27:11+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-effective-health-care-security-is-more-than-hipaa www.secnews.physaphae.fr/article.php?IdArticle=2779770 False None None None CybeReason - Vendor blog Ransomware Attacks are Evolving – Is Your SOC Ready? Ransomware Attacks are Evolving – Is Your SOC Ready? Ransomware actors are known to innovate on a regular basis, and these past few years have seen an acceleration in the evolution of tactics and techniques designed to make the attacks more effective.]]> 2021-05-12T13:27:30+00:00 https://www.cybereason.com/blog/ransomware-attacks-are-evolving-is-your-soc-ready www.secnews.physaphae.fr/article.php?IdArticle=2774116 False None None None CybeReason - Vendor blog Webinar: Cybereason vs. DarkSide Ransomware Webinar: Cybereason vs. DarkSide Ransomware Colonial Pipeline was recently the victim of a devastating attack that shut down U.S. operations across the East Coast, threatening an already tenuous economic recovery effort. This attack against critical infrastructure by the DarkSide Ransomware gang highlights the urgent need for better ransomware prevention, detection and response.]]> 2021-05-11T22:19:35+00:00 https://www.cybereason.com/blog/webinar-cybereason-vs.-darkside-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2770645 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: Creating BSides - A Grassroots Security Conference Malicious Life Podcast: Creating BSides - A Grassroots Security Conference Security BSides - or just 'BSides' for those in the know - is the first grassroots, DIY, open security conference in the world, and has grown to more than 650 events in more than 50 countries.]]> 2021-05-11T13:35:53+00:00 https://www.cybereason.com/blog/malicious-life-podcast-creating-bsides-a-grassroots-security-conference www.secnews.physaphae.fr/article.php?IdArticle=2767560 False None None None CybeReason - Vendor blog Inside the DarkSide Ransomware Attack on Colonial Pipeline Inside the DarkSide Ransomware Attack on Colonial Pipeline On May 8, the Colonial Pipeline Company announced that it had fallen victim to a ransomware attack a day earlier. The pipeline operations include transporting 100 million gallons of fuel daily to meet the needs of consumers across the entire eastern seaboard of the U.S. from Texas to New York, according to the website of the refined products pipeline company.]]> 2021-05-10T19:57:09+00:00 https://www.cybereason.com/blog/inside-the-darkside-ransomware-attack-on-colonial-pipeline www.secnews.physaphae.fr/article.php?IdArticle=2763585 False Ransomware None None CybeReason - Vendor blog Defining XDR from an MSSP Perspective Defining XDR from an MSSP Perspective If you're not entirely clear on what Extended Detection and Response (XDR) is, you wouldn't be alone. Most understand it as the evolution of Endpoint Detection and Response (EDR) that covers the areas of the attack surface beyond the endpoint, including assets like cloud workloads, containers, and user identities.]]> 2021-05-10T13:05:02+00:00 https://www.cybereason.com/blog/defining-xdr-from-an-mssp-perspective www.secnews.physaphae.fr/article.php?IdArticle=2761139 False None None None CybeReason - Vendor blog The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP The Cybereason team is excited to announce that Gartner has named Cybereason a Visionary in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. This is Cybereason's first recognition in this influential industry report, and we believe our placement in the Visionary Quadrant is because of the value and future-readiness of the Cybereason Defense Platform and the superior endpoint protection (EPP) and extended detection and response (XDR) functionality that it delivers. ]]> 2021-05-06T15:18:49+00:00 https://www.cybereason.com/blog/the-cybereason-advantage-why-cybereason-was-named-a-visionary-in-the-2021-gartner-magic-quadrant-for-epp www.secnews.physaphae.fr/article.php?IdArticle=2746721 False None None None CybeReason - Vendor blog CISO Stories Podcast: Stop Reporting Useless Security Metrics! CISO Stories Podcast: Stop Reporting Useless Security Metrics! All disciplines need to be able to demonstrate added value and track the ability to improve upon current practices. The board, technical management, auditors, and engineers may each need a different view of the security initiatives performed.]]> 2021-05-06T13:22:43+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-stop-reporting-useless-security-metrics www.secnews.physaphae.fr/article.php?IdArticle=2746110 False None None None CybeReason - Vendor blog Three Keys to a Reliable Ransomware Defense Strategy Three Keys to a Reliable Ransomware Defense Strategy As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 - 62% more than the total number of ransomware attacks for 2019. The estimated cost of those incidents increased from $11.5 billion to $20 billion during that same time period. Average ransom costs also rose from $5,900 to $8,100 between those two years, with associated downtime losses growing from $141,000 to $283,000.]]> 2021-05-05T13:10:23+00:00 https://www.cybereason.com/blog/three-keys-to-a-reliable-ransomware-defense-strategy www.secnews.physaphae.fr/article.php?IdArticle=2742234 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: China\'s Unrestricted Cyberwarfare Part 1 Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1 Back in the 1990s, cyberwarfare was a word rarely used in the West - and definitely unheard of in China, which was just taking its first steps on the Internet. Two Chinese military officers, veterans of the semi-conflict with Taiwan, helped shape the role of cyber in modern warfare in China and beyond.]]> 2021-05-04T12:05:16+00:00 https://www.cybereason.com/blog/malicious-life-podcast-chinas-unrestricted-cyberwarfare-part-1 www.secnews.physaphae.fr/article.php?IdArticle=2737250 False None None None CybeReason - Vendor blog Securing the Financial Sector Now and Into the Future with XDR Securing the Financial Sector Now and Into the Future with XDR Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, days, or weeks. Unfortunately, time is the most precious resource when responding to incidents. The longer adversaries linger in an IT environment, the longer they have to deploy footholds, move to other machines, and access more data.]]> 2021-05-03T12:58:32+00:00 https://www.cybereason.com/blog/securing-the-financial-sector-now-and-into-the-future-with-xdr www.secnews.physaphae.fr/article.php?IdArticle=2732440 False None None None CybeReason - Vendor blog 100 Days Down, 1,360 Days of Nation-State Cybersecurity Threats to Go CEO Blog Series This week marks the milestone of the Biden Administration's first 100 days. It is somewhat arbitrary to expect an incoming president to achieve significant progress in just 100 days, or to judge success or failure based on such a small span of time. However, it does provide a glimpse into the vision and direction of the administration, and so far it seems like President Biden is preparing to address the growing cybersecurity threat from our adversaries. ]]> 2021-04-30T12:20:47+00:00 https://www.cybereason.com/blog/100-days-down-1360-days-of-nation-state-cybersecurity-threats-to-go www.secnews.physaphae.fr/article.php?IdArticle=2721690 False Threat None None CybeReason - Vendor blog PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector The Cybereason Nocturnus Team has been tracking recent developments in the RoyalRoad weaponizer, also known as the 8.t Dropper/RTF exploit builder. Over the years, this tool has become a part of the arsenal of several Chinese-related threat actors such as Tick, Tonto Team and TA428, all of which  employ RoyalRoad regularly for spear-phishing in targeted attacks against high-value targets. ]]> 2021-04-30T12:11:34+00:00 https://www.cybereason.com/blog/portdoor-new-chinese-apt-backdoor-attack-targets-russian-defense-sector www.secnews.physaphae.fr/article.php?IdArticle=2721691 False Tool,Threat None None CybeReason - Vendor blog CISO Stories Podcast: Necessity is the Mother of Security CISO Stories Podcast: Necessity is the Mother of Security Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges - check it out...]]> 2021-04-29T12:38:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-necessity-is-the-mother-of-security www.secnews.physaphae.fr/article.php?IdArticle=2714324 False None None 2.0000000000000000 CybeReason - Vendor blog Webinar: The Current State and Future Challenges of Security Webinar: The Current State and Future Challenges of Security Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. Supply Chain weaknesses, Ransomware, the “new normal” going forward, the evolution of the MITRE framework and more are all fair game.]]> 2021-04-28T13:54:57+00:00 https://www.cybereason.com/blog/webinar-the-current-state-and-future-challenges-of-security www.secnews.physaphae.fr/article.php?IdArticle=2708704 False None None None CybeReason - Vendor blog Five Things You Need to Know About Ransomware Attacks Five Things You Need to Know About Ransomware Attacks The digital threat landscape as a whole is constantly changing and evolving. That can make it difficult to keep track of new developments for specific threats like ransomware. Don't worry though, Cybereason has got you covered.]]> 2021-04-28T12:59:38+00:00 https://www.cybereason.com/blog/five-things-you-need-to-know-about-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=2708451 False Ransomware,Threat None None CybeReason - Vendor blog Cybereason vs. Avaddon Ransomware Cybereason vs. Avaddon Ransomware Over the last few months, the Cybereason Nocturnus Team has been tracking the activity of the Avaddon Ransomware. It has been active since June 2020 and is operating with the Ransomware-as-a-Service (RaaS) and double extortion models, targeting sectors such as healthcare. Avaddon is distributed via malspam campaigns, where the victim is being lured to download the malware loader.]]> 2021-04-27T14:52:51+00:00 https://www.cybereason.com/blog/cybereason-vs.-avaddon-ransomware www.secnews.physaphae.fr/article.php?IdArticle=2703416 False Ransomware,Malware None None CybeReason - Vendor blog Malicious Life Podcast: Can Nuclear Power Plants Be Hacked? Malicious Life Podcast: Can Nuclear Power Plants Be Hacked? Andrew Ginter, VP of Industrial Security at Waterfall Security Solutions, dives into cybersecurity challenges for Nuclear facilities - how secure are modern nuclear power plants from cyber attacks? Check it out...]]> 2021-04-27T13:08:29+00:00 https://www.cybereason.com/blog/malicious-life-can-nuclear-power-plants-be-hacked www.secnews.physaphae.fr/article.php?IdArticle=2702837 False None None None CybeReason - Vendor blog Integrating Endpoint and Mobile Device Security Integrating Endpoint and Mobile Device Security Enterprise teams are advised in this report to integrate their traditional and next-generation endpoint security protections with emerging mobile security safeguards.]]> 2021-04-26T12:05:22+00:00 http://www.cybereason.com/blog/integrating-endpoint-and-mobile-device-security www.secnews.physaphae.fr/article.php?IdArticle=2695215 False None None None CybeReason - Vendor blog HAFNIUM Exploits Live On HAFNIUM Exploits Live On The Prometei Botnet is not new. Like most malware and exploits, it continues to adapt and change over time. What is concerning is what is happening now. Our latest research demonstrates  how Prometei has evolved and reveals that current versions of Prometei are now exploiting some of the vulnerabilities in Microsoft Exchange that were part of the recent HAFNIUM attacks. We will continue to deal with lingering effects from these specific Microsoft Exchange vulnerabilities, but-more importantly-we will continue to deal with vulnerabilities in general and that requires a better approach to cybersecurity.]]> 2021-04-22T19:27:46+00:00 https://www.cybereason.com/blog/hafnium-exploits-live-on www.secnews.physaphae.fr/article.php?IdArticle=2680024 False Malware None None CybeReason - Vendor blog Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack The Sodinokibi ransomware gang is trying to extort Apple following an attack against one of the tech giant's business partners. According to Bloomberg News, someone using the moniker “Unknown” announced on April 18 that the Sodinokibi/REvil gang was about to disclose their “largest attack ever.”]]> 2021-04-22T13:03:55+00:00 https://www.cybereason.com/blog/sodinokibi-ransomware-gang-extorts-apple-through-supply-chain-attack www.secnews.physaphae.fr/article.php?IdArticle=2678283 False Ransomware None None CybeReason - Vendor blog Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities Recently, the Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware.]]> 2021-04-22T03:55:00+00:00 https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities www.secnews.physaphae.fr/article.php?IdArticle=2676881 False None None None CybeReason - Vendor blog MITRE ATT&CK: Cybereason Dominates the Competition MITRE ATT&CK: Cybereason Dominates the Competition The long-awaited 2020 MITRE ATT&CK evaluations are out! With the MITRE ATT&CK framework now being the standard by which Defenders can measure the effectiveness of various solutions in tracking adversary behavior, cyber vendors are cherry-picking results from this latest testing round and spinning up clever interpretations of the data in their favor. At Cybereason, we are proud to let the test results speak for themselves. ]]> 2021-04-21T20:58:41+00:00 https://www.cybereason.com/blog/mitre-attck-cybereason-dominates-the-competition www.secnews.physaphae.fr/article.php?IdArticle=2675659 False None None None CybeReason - Vendor blog Inside Effective EDR Evaluation Testing Inside Effective EDR Evaluation Testing Periodically, I receive requests from customers asking for explanations on why this particular technique or that one doesn't generate a Malop™ in the Cybereason Defense Platform. Such questions illustrate that there is still a great deal of education to be done on the nature of EDR across much of the security industry. ]]> 2021-04-21T19:08:01+00:00 https://www.cybereason.com/blog/inside-effective-edr-evaluation-testing www.secnews.physaphae.fr/article.php?IdArticle=2675660 False None None None CybeReason - Vendor blog CISO Stories Podcast: He Fought the FTC Over a Breach and Won CISO Stories Podcast: He Fought the FTC Over a Breach and Won Hopefully, you won't ever have to hire a lawyer to defend yourself against a government regulator. So what happens when the Federal Trade Commission or other powerful body baselessly accuses your company of wrongdoing where a data breach is concerned?]]> 2021-04-21T14:16:50+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-he-fought-the-ftc-over-a-breach-and-won www.secnews.physaphae.fr/article.php?IdArticle=2674777 False Data Breach None None CybeReason - Vendor blog Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations The results of the latest ATT&CK Evaluation, conducted by MITRE Engenuity, are out! Our Cybereason Defense Platform was evaluated on its ability to prevent and detect advanced attacks, achieving 100% coverage for prevention of Windows and Linux-based threats, and 98% technique visibility across the 54 advanced attack techniques applied in testing. The MITRE Evaluation validates Cybereason's future-ready attack protection, and superior prevention, detection and response capabilities.]]> 2021-04-20T17:05:14+00:00 https://www.cybereason.com/blog/cybereason-excels-in-2020-mitre-engenuity-attck-evaluations www.secnews.physaphae.fr/article.php?IdArticle=2671369 False None None None CybeReason - Vendor blog Malicious Life Podcast: Shutting Down the Internet in 30 Minutes Malicious Life Podcast: Shutting Down the Internet in 30 Minutes Chris Wysopal (aka WeldPond), cybersecurity pioneer and one of L0pht's founding members, talks about the group's 1998 testimony in the Senate, how they used shaming to force corporations to secure their software, and the (not so fortunate) consequences of the acquisition by @stake - check it out...]]> 2021-04-20T12:39:19+00:00 https://www.cybereason.com/blog/malicious-life-shutting-down-the-internet-in-30-min www.secnews.physaphae.fr/article.php?IdArticle=2670634 False None None None CybeReason - Vendor blog Ransomware Decoded: Preventing Modern Ransomware Attacks Ransomware Decoded: Preventing Modern Ransomware Attacks Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing immediate damage.]]> 2021-04-19T13:25:54+00:00 https://www.cybereason.com/blog/preventing-modern-ransomware-attacks www.secnews.physaphae.fr/article.php?IdArticle=2666029 False Ransomware,Malware None None CybeReason - Vendor blog Cybereason and MassCyberCenter Partner to Mentor College Students Cybereason and MassCyberCenter Partner to Mentor College Students Cybereason is pleased to announce that it has joined with the MassCyberCenter at the MassTech Collaborative and other Massachusetts companies to mentor college students from 14 schools across the state. Cybereason has three on-staff mentors, including: Sam Curry, Chief Security Officer, Lodrina Cherne, Principal Security Advocate and Maggie MacAlpine, Security Strategist. ]]> 2021-04-16T13:59:20+00:00 https://www.cybereason.com/blog/cybereason-and-masscybercenter-partner-to-mentor-college-students www.secnews.physaphae.fr/article.php?IdArticle=2653167 False None None None CybeReason - Vendor blog MITRE ATT&CK Evaluations - Unpacking the Emulation MITRE ATT&CK Evaluations - Unpacking the Emulation If you've been researching MITRE ATT&CK and aligning your security program maturity measurement to it, you're likely excited for this year's ATT&CK evaluation from MITRE Engenuity, which tests security vendors' ability to quickly detect and stop tactics and techniques used by today's threat actors.]]> 2021-04-15T18:02:25+00:00 https://www.cybereason.com/blog/mitre-attck-evaluations-unpacking-the-emulation www.secnews.physaphae.fr/article.php?IdArticle=2647605 False Threat None None CybeReason - Vendor blog CISO Stories Podcast: Is There a Magic Security Control List? CISO Stories Podcast: Is There a Magic Security Control List? Never in history has the cyber defender had access to so many technologies and tools to defend our companies. This has created a “Fog of More,” making the choices difficult to manage. This week's guest is Tony Sager, a 35-year NSA software vulnerability analyst and executive, and the innovator of community-based controls sharing. Sager discusses how the CIS Controls can be used effectively to manage your environment - check it out...]]> 2021-04-15T13:13:18+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-is-there-a-magic-security-control-list www.secnews.physaphae.fr/article.php?IdArticle=2646015 False Vulnerability None None CybeReason - Vendor blog Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks We live in a world of insecurity where malicious actors have for too long enjoyed an advantage over defenders charged with protecting their organization's networks from cyberattacks. Nowhere is that more evident than with critical infrastructure providers who are facing a constant barrage of attacks from motivated cybercriminals and well-funded state-sponsored actors.]]> 2021-04-14T18:47:09+00:00 https://www.cybereason.com/blog/biden-admin-takes-action-to-defend-electric-utilities-against-cyberattacks www.secnews.physaphae.fr/article.php?IdArticle=2640869 False None None None CybeReason - Vendor blog Rise of Double-Extortion Shines Spotlight on Ransomware Prevention Rise of Double-Extortion Shines Spotlight on Ransomware Prevention Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim's machine before launching its encryption routine.]]> 2021-04-14T13:01:39+00:00 https://www.cybereason.com/blog/rise-of-double-extortion-shines-spotlight-on-ransomware-prevention www.secnews.physaphae.fr/article.php?IdArticle=2638198 False Ransomware None None CybeReason - Vendor blog Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2 Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2 In the early days, the L0pht crew tinkered with technology they already had laying around or could find dumpster-diving. But things change, of course. By the end of the '90s many of the L0pht hackers had quit their day jobs and incorporated under the name “L0pht Heavy Industries” while moving into a nicer space, the “new L0pht.”]]> 2021-04-13T13:42:55+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p2 www.secnews.physaphae.fr/article.php?IdArticle=2630823 False None None None CybeReason - Vendor blog Five Clear Steps to Enhance SecOps with MITRE ATT@CK Five Clear Steps to Enhance SecOps with MITRE ATT@CK A skyrocketing number of alerts, limited security talent, and millions of new malware strains daily have made security a seemingly insurmountable task. ]]> 2021-04-12T02:50:19+00:00 https://www.cybereason.com/blog/steps-to-enhance-secops-with-mitre-attck www.secnews.physaphae.fr/article.php?IdArticle=2622804 False Malware None None CybeReason - Vendor blog CISO Stories Podcast: Doing Security Before Security Was a Career Path CISO Stories Podcast: Doing Security Before Security Was a Career Path Special guest Petri Kuivala, CISO at NXP Semiconductors, recounts his journey from municipal police officer to cybercrimes unit investigator to Chief Information Security Officer during the early days when security was largely an afterthought - check it out...]]> 2021-04-08T14:28:16+00:00 https://www.cybereason.com/blog/ciso-stories-podcast-doing-security-before-security-was-career-path www.secnews.physaphae.fr/article.php?IdArticle=2605066 False None None None CybeReason - Vendor blog The Cybereason Difference: Introduction to the Malop The Cybereason Difference: Introduction to the Malop Welcome to the April edition of our series The Cybereason Difference (inaugural post here). Each post of this series explores a unique way that Cybereason empowers defenders.]]> 2021-04-07T13:19:32+00:00 https://www.cybereason.com/blog/the-cybereason-difference-malop-intro www.secnews.physaphae.fr/article.php?IdArticle=2599434 False None None None CybeReason - Vendor blog Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1 Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1 'L0pht', or 'L0pht Heavy Industries' was one of the most influential hacker collectives of the '90s: its members were even invited to testify in front of the Congress on the current state of Internet security.]]> 2021-04-06T14:27:20+00:00 https://www.cybereason.com/blog/malicious-life-podcast-the-story-of-l0pht-p1 www.secnews.physaphae.fr/article.php?IdArticle=2593323 False None None None CybeReason - Vendor blog Cybereason Empowers Partners with North American MSSP Program Expansion Cybereason Empowers Partners with North American MSSP Program Expansion Cybereason is pleased to announce expansion of the North American channel with the launch of the Managed Security Services Provider (MSSP) Program. The program will support current and future partners by enhancing revenue streams through improved efficacy in detection and response services they offer to their clients. ]]> 2021-04-06T13:39:57+00:00 https://www.cybereason.com/blog/cybereason-empowers-partners-with-north-american-mssp-program-expansion www.secnews.physaphae.fr/article.php?IdArticle=2592788 False None None None