<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Attackers turn to masquerading icons to boost phishing attack’s success

Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome.

GDPR Questions and Answers

GDPR

GDPR Questions and Answers

From is a ransomware attack considered attack under GDPR to how much can a company be fined for violating GDPR, security professionals have several questions on how the regulation impacts them. This blog answers some of them.

Attackers turn to masquerading icons to boost phishing attack’s success

Research

Attackers turn to masquerading icons to boost phishing attack’s success

Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome.

Olympic Destroyer: Calculated Provocation or an Amateur's best shot?

Research

Olympic Destroyer: Calculated Provocation or an Amateur's best shot?

Olympic Destroyer was designed to cause destruction, and while some systems were impacted, the malware didn’t lead to massive disruptions during the Winter Olympics’ opening ceremonies.

The challenges of detecting compromised public Web servers

cybersecurity

The challenges of detecting compromised public Web servers

Compromised Web application servers have been a security issue since the dawn of the Internet but many security solutions don't detect this threat.

Cybereason CISO Interview Series: Security’s appeal lies in the challenge

CISO

Cybereason CISO Interview Series: Security’s appeal lies in the challenge

Challenges are what drive Jason Callahan. He pursued a career in cybersecurity over other areas of IT because the field required obtaining extensive knowledge on an assortment of technologies. His latest challenge: developing a cybersecurity program at Illumina, which designs and manufactures machines used for genetic analysis.

How to Mitigate Adobe Flash Player Zero-Day Vulnerability APSA18-01

zero day exploit

How to Mitigate Adobe Flash Player Zero-Day Vulnerability APSA18-01

The South Korean Computer Emergency Response Team (KR-CERT) issued a warning Wednesday about a new Adobe Flash Player zero-day spotted in the wild. The security bulletin warns that the attacks target South Korean organizations and involves malicious Microsoft Word documents.

Iran strikes back?

nation-state attack

Iran strikes back?

Iran could launch a cyberattack against the U.S. but likely won't unless the situation around the nuclear deal sours.

New lateral movement techniques abuse DCOM technology

Lateral movement

New lateral movement techniques abuse DCOM technology

Cybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.

What to Expect from the Biggest Threat Actors During the Winter Olympics

spear phishing

What to Expect from the Biggest Threat Actors During the Winter Olympics

Over the last decade, the number and severity of cybersecurity events pertaining to the Olympic Games has steadily increased. Here's what to expect from the major threat actors during next month's Winter Games in South Korea.

Cybereason CISO Interview Series: Peraton’s Phil Mazzocco

cybersecurity

Cybereason CISO Interview Series: Peraton’s Phil Mazzocco

The career path to security leadership doesn’t have to start with a background in technology, as Peraton CSO Phil Mazzocco, a history major, shows.