<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

New Betabot campaign under the microscope

The Cybereason SOC has detected multiple Betabot infections in customer environments. In this blog, Cybereason researchers study Betabot’s infection chain and self-defense mechanisms using data gathered from customer environments.

New Betabot campaign under the microscope

Research

New Betabot campaign under the microscope

The Cybereason SOC has detected multiple Betabot infections in customer environments. In this blog, Cybereason researchers study Betabot’s infection chain and self-defense mechanisms using data gathered from customer environments.

Why hacking electronic voting machines isn't the only way to impact an election

cybersecurity

Why hacking electronic voting machines isn't the only way to impact an election

Cybereason held a tabletop exercise to see how attackers could influence elections and how elected officials would protect the vote.

VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: Part one

Research

VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: Part one

Cybereason's Nocturnus Research team analyzes campaigns targeting the Brazilian financial sector, focusing on infection vectors and the threat actor's toolset and techniques.

Wannamine cryptominer that uses EternalBlue still active

Featured

Wannamine cryptominer that uses EternalBlue still active

The Wannamine cryptominer, which uses the EternalBlue exploits, is still active although a patch that fixes these well-known vulnerabilities was released last March. Amit Serper, Cybereason's head of security research, examines this variant and makes the case for patching your systems.

The anatomy of a .NET malware dropper

security research

The anatomy of a .NET malware dropper

Attackers don't need sophisticated tools to create effective malware. Basic tools work just fine. Case in point: Cybereason researchers discovered a .NET dropper/crypter. Here's how they reverse engineered it.

Cybereason CISO Interview Series: Protecting all the news that’s fit to print and the peacock network

CISO

Cybereason CISO Interview Series: Protecting all the news that’s fit to print and the peacock network

Mike Higgins, who's served as CSO of The New York Times and CISO of NBC Universal, talks about why nation-states were interested in attacking the paper of record, why media companies were slow to realize the importance of information security and why you don’t have to be a technical expert to pursue a security career.

Stopping the bad guys, part two

Events

Stopping the bad guys, part two

Cybereason is launching our Ai Hunting Tour - a cross-country road show - in just a few short weeks. We’re scheduled to visit 34 cities and more always seem to be added. If you’re a CISO, an analyst, or anything in between - there’s going to be something for everyone.

How to navigate events that can either make or a break a CISO's career: maturity shift and management briefings

CISO

How to navigate events that can either make or a break a CISO's career: maturity shift and management briefings

Security leaders need to approach management briefings and maturity shifts with a business mindset and show how the security department will help the organization. Remember to omit the technical details. They'll only portray the CISO or CSO as a technologist who isn't ready for the C-suite, said Cybereason CSO Sam Curry.

Your questions answered from the AI Hunting in Action webinar

ai hunting

Your questions answered from the AI Hunting in Action webinar

From does Cybereason detect fileless malware attacks that use PowerShell to how Cybereason uses artificial intelligences to detect advanced attacks, here are answers to some of the questions we received after our AI Hunting in Action webinar.

ICS Threat Broadens: Nation-State Hackers Are No Longer The Only Game In Town

Research

ICS Threat Broadens: Nation-State Hackers Are No Longer The Only Game In Town

APT actors and nation states aren't the only adversaries interested in ICS environments. Threat actors who use sophisticated techniques but are also amateurish are now targeting utility providers. That's according to the data from a honeypot Cybereason setup to emulate the power transmission substation of a major electricity provider.