Malicious Life Podcast: The Y2K Bug Pt. 2
Cybereason Blog
by Malicious Life Podcast
10h ago
In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as calendars rolled over to the year 2000. This episode delves into Bemer's life during this critical period, exploring his predictions, the ensuing global frenzy to avert disaster, and the disparate views on whether the billions spent in prevention were ..read more
Visit website
Threat Alert: The Anydesk Breach Aftermath
Cybereason Blog
by Cybereason Security Services Team
3w ago
Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them ..read more
Visit website
Cybereason’s evolution to disrupt beyond SIEM and XDR market
Cybereason Blog
by CK Chim
1M ago
Today enterprises are accelerating to invest into digitalization to stay ahead of competition. They are increasingly encountering an evolving threat landscape and complex security challenges - with more workloads in multi clouds, more workforces in hybrid environments, and more intelligent devices connected in mission critical operations. This transformation journey is exacerbated by exponential increase in compute resources, data volumes and security tooling, driving up the cost of storing, managing and analyzing the data for security purposes ..read more
Visit website
Malicious Life Podcast: Can You Bomb a Hacker?
Cybereason Blog
by Malicious Life Podcast
1M ago
The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This episode delves into the ethical and legal implications of civilian participation in cyberwarfare, examining real-world examples from Ukraine and beyond ..read more
Visit website
Beware of the Messengers, Exploiting ActiveMQ Vulnerability
Cybereason Blog
by Cybereason Security Services Team
1M ago
Cybereason Security Services issues Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ..read more
Visit website
Bridging the Gap: Balancing Security Compliance and Innovation in Cybersecurity
Cybereason Blog
by Jens Gehring
1M ago
As an Ex-Amazonian (AWS) and cloud-native guy by passion, I never thought I would write a blog post like the following. But I'm also a Defender, a cyber security enthusiast and most of all customer obsessed and therefore I recognize that the world is not black and white, instead it's colorful with a wide range of colors and several nuances. So are the requirements from companies. This leads us to the questions ..read more
Visit website
Malicious Life Podcast: Kevin Mitnick, Part 2
Cybereason Blog
by Malicious Life Podcast
1M ago
In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He began to rebuild his life: he started working out and lost a hundred pounds, and most importantly - he was finally on the path towards ditching his self-destructive obsession of hacking. But just as he was in the process of turning his life around, his brother introduced him to a hacker named Eric Heinz, who told him about a mysterious piece of equipment he came across while breaking into Pacific Bell: SAS, a testing system that allowed its user to listen in on all the calls going through the tel ..read more
Visit website
Malicious Life Podcast: Kevin Mitnick, Part 1
Cybereason Blog
by Malicious Life Podcast
2M ago
For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity in solitary confinement, Mitnick wasn't able to shake the disease that compelled him to keep breaking into more and more communication systems.  ..read more
Visit website
Ransomware: True Cost to Business 2024
Cybereason Blog
by
2M ago
If I could have one wish for 2024, it would be that we stop calling ransomware by the same name ..read more
Visit website
Announcing Cybereason On-Prem
Cybereason Blog
by Mike Smart
2M ago
Cybereason are pleased to announce the General Availability of Cybereason On-Prem v23.1 ..read more
Visit website

Follow Cybereason Blog on FeedSpot

Continue with Google
Continue with Apple
OR