Cybereason Blog
274 FOLLOWERS
Get the latest research, expert insights, and security industry news. Cybereason's Blog for cybersecurity news and analysis, from the researchers behind our cybersecurity data analytics platform. Cybereason is the leader in endpoint protection, offering endpoint detection and response, next-generation antivirus, managed to monitor, and IR services.
Cybereason Blog
3w ago
Cybereason issues Threat Alerts to inform customers of emerging impacting threats, including critical vulnerabilities. Cybereason Threat Alerts summarize these threats and provide practical recommendations for protecting against them ..read more
Cybereason Blog
3w ago
Today enterprises are accelerating to invest into digitalization to stay ahead of competition. They are increasingly encountering an evolving threat landscape and complex security challenges - with more workloads in multi clouds, more workforces in hybrid environments, and more intelligent devices connected in mission critical operations. This transformation journey is exacerbated by exponential increase in compute resources, data volumes and security tooling, driving up the cost of storing, managing and analyzing the data for security purposes ..read more
Cybereason Blog
1M ago
The 2008 Russo-Georgian War marked a turning point: the first time cyberattacks were used alongside traditional warfare. But what happens when the attackers aren't soldiers, but ordinary citizens? This episode delves into the ethical and legal implications of civilian participation in cyberwarfare, examining real-world examples from Ukraine and beyond ..read more
Cybereason Blog
1M ago
Cybereason Security Services issues Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ..read more
Cybereason Blog
1M ago
As an Ex-Amazonian (AWS) and cloud-native guy by passion, I never thought I would write a blog post like the following. But I'm also a Defender, a cyber security enthusiast and most of all customer obsessed and therefore I recognize that the world is not black and white, instead it's colorful with a wide range of colors and several nuances. So are the requirements from companies. This leads us to the questions ..read more
Cybereason Blog
1M ago
In 1991, Kevin Mitnick was bouncing back from what was probably the lowest point of his life. He began to rebuild his life: he started working out and lost a hundred pounds, and most importantly - he was finally on the path towards ditching his self-destructive obsession of hacking.
But just as he was in the process of turning his life around, his brother introduced him to a hacker named Eric Heinz, who told him about a mysterious piece of equipment he came across while breaking into Pacific Bell: SAS, a testing system that allowed its user to listen in on all the calls going through the tel ..read more
Cybereason Blog
1M ago
For Kevin Mitnick - perhaps the greatest social engineer who ever lived - hacking was an obsession: even though it ruined his marriage, landed him in scary correction facilities and almost cost him his sanity in solitary confinement, Mitnick wasn't able to shake the disease that compelled him to keep breaking into more and more communication systems.  ..read more
Cybereason Blog
2M ago
If I could have one wish for 2024, it would be that we stop calling ransomware by the same name ..read more
Cybereason Blog
2M ago
Cybereason are pleased to announce the General Availability of Cybereason On-Prem v23.1 ..read more
Cybereason Blog
2M ago
This Threat Analysis Report will delve into compromised YouTube accounts being used as a vector for the spread of malware. It will outline how this attack vector is exploited for low-burn, low-cost campaigns, highlighting strategies used by threat actors and how defenders can detect and prevent these attacks.  ..read more