<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Blog

Who watches the watchers? Thoughts about the Uber breach

Post by: Sam Curry

According to Bloomberg, about a year ago hackers stole the personal data of 57 million Uber customers and drivers. After finding out about this breach, Uber leaders not only decided against...

+ Read More

How new threats curb the effectiveness of antivirus and next-generation antivirus

Post by: Fred O'Connor

For several years, protecting endpoints meant using antivirus software. These programs, which are commonly referred to as AV, are designed to detect malicious programs, prevent them from executing...

+ Read More

How boards can take responsibility for cybersecurity

Post by: Fred O'Connor

If security wasn't already a board-level topic of discussion, destructive attacks like NotPetya and WannaCry and the threat of ransomware have undoubtedly made it one. Cybersecurity has crept its...

+ Read More

A CISO’s biggest concern? Better alignment between security and business

Post by: Fred O'Connor

The biggest concern for CISOs isn’t necessarily a nation-state attack or a user unknowingly clicking on a link in a phishing email or protecting their company from a new, nasty piece of malware....

+ Read More

NotPetya still roils company's finances, costing organizations $1.2 billion in revenue

Post by: Fred O'Connor

During a call on Tuesday to discuss its third-quarter earnings, AP Moller-Maersk executives brought up topics typically associated with operating Maersk Line, the world’s largest largest container...

+ Read More

Leveraging Excel DDE for lateral movement via DCOM

Post by: Philip Tsukerman

DDE, or Dynamic Data Exchange, is a legacy interprocess communication mechanism that’s been part of some Windows applications since as early as 1987. DDE enables applications to request items made...

+ Read More

Night of the Devil: Ransomware or wiper? A look into targeted attacks in Japan using MBR-ONI

Post by: ASSAF DAHAN

For several months Cybereason has been following the concerning rise of ONI, a family of ransomware involved in targeted attacks against Japanese companies. We suspect that the ONI ransomware was...

+ Read More

Abandon ship? Cyberattacks and the shipping industry

Post by: Ross Rustici

The intentional misdirection of shipping vessels in the Black Sea, the jamming of GPS along South Korea, and the multiple collisions of the United States Seventh Fleet are almost certainly...

+ Read More

PowerShell attacks stopped: When automated detection meets security services

Post by: Fred O'Connor

With attackers increasingly using PowerShell to compromise organizations, red teams are incorporating this tactic into their penetration testing exercises.

+ Read More

Cybereason researcher discovers vaccine for Bad Rabbit ransomware

Post by: Lital Asher-Dotan

Cybereason researcher Amit Serper has developed a vaccine to prevent the Bad Rabbit data-encrypting malware from infecting machines. 

+ Read More