<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Attackers use botnets to break into networks faster

No one likes grunt work, including attackers, who have turned to bots to automatically handle menial tasks like exploiting vulnerabilities. If exploit automation wasn’t enough of a concern for security teams, this technique has grown even more potent with attackers using bots that can automatically exploit vulnerabilities, create backdoors, dump passwords, conduct network reconnaissance, and laterally move in seconds.

Cybereason named Israel’s most promising startup

cybersecurity

Cybereason named Israel’s most promising startup

Cybereason was named Israel’s most promising startup by Calcalist, the country's leading financial newspaper.

Attackers use botnets to break into networks faster

Research

Attackers use botnets to break into networks faster

No one likes grunt work, including attackers, who have turned to bots to automatically handle menial tasks like exploiting vulnerabilities. If exploit automation wasn’t enough of a concern for security teams, this technique has grown even more potent with attackers using bots that can automatically exploit vulnerabilities, create backdoors, dump passwords, conduct network reconnaissance, and laterally move in seconds.

Cybereason CISO Interview Series: It’s only information security (but I like it)

cybersecurity

Cybereason CISO Interview Series: It’s only information security (but I like it)

Sometimes the career path to security and IT leadership doesn’t involve an undergraduate degree in computer science. Sometimes reaching the ranks of CIO and CISO involves an English degree and a desire to play rock-and-roll for a living.

Kim Kowtows: Attempting to build a hub and spoke negotiation while still staying deferential

north korea

Kim Kowtows: Attempting to build a hub and spoke negotiation while still staying deferential

Kim Jong-un is seeking to subvert the six-party talks paradigm with a hub-and-spoke model that places North Korea at the center of all negotiations.

ESG Solution Showcase: The Cybereason Endpoint Security Platform

Endpoint Security

ESG Solution Showcase: The Cybereason Endpoint Security Platform

An ESG report outlines how Cybereason meets the requirements for a next-generation endpoint security platform by delivering protection through NGAV and endpoint detection and response.

Trade war could motivate China to trade hide and bide for attack and retaliate against US companies

cybersecurity

Trade war could motivate China to trade hide and bide for attack and retaliate against US companies

China has substantially decreased cyberattacks against U.S. companies in recent years. But that doesn't mean the threat has disappeared. China just needs a reason to ramp up attacks. And a trade war could serve as that catalyst.

4 Things to Consider When Assessing NGAV Solutions

next generation antivirus

4 Things to Consider When Assessing NGAV Solutions

Before you purchased a NGAV tool, here are four points to consider.

Negotiations Alter North Korea’s Hacking Threat

cybersecurity

Negotiations Alter North Korea’s Hacking Threat

The upcoming talks between the U.S., South Korea and North Korea could see the DPRK change its hacking tactics to focus more on espionage campaigns against the U.S. in an attempt to figure out how the Trump administration will approach the potential meeting.

Ransomware: Down but by no means out

NotPetya

Ransomware: Down but by no means out

In this blog, Ross Rustici, Cybereason’s Senior Director for Intelligence Services, debunks a few common ransomware myths, talks about what other threats attackers may use instead and explains why organizations still need to remain vigilant against ransomware.

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

antivirus

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.