<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Digital Forensic Breadcrumbs at the 2020 Grace Hopper Celebration

Events

Digital Forensic Breadcrumbs at the 2020 Grace Hopper Celebration

With 25,000 participants expected to attend, and keynotes from Serena Williams and Megan Rapinoe, the Grace Hopper Celebration brings together women in STEM across the globe, in the first ever virtual edition of the conference.

Operation Blackout Virtual Edition: Election Security Tabletops

Events

Operation Blackout Virtual Edition: Election Security Tabletops

With looming 2020 elections across the world over the next few months and a global pandemic underway, on August 20, 2020, Cybereason hosted Operation Blackout 2020, its latest virtual election security tabletop exercise with participants from the FBI, CISA, and other government organizations.

Hacker Summer Camp is Cancelled, Long Live Virtual Hacker Summer Camp

Events

Hacker Summer Camp is Cancelled, Long Live Virtual Hacker Summer Camp

A few months ago, in light of the ongoing pandemic, fears that hacker summer camp would be cancelled were realized. However, festivities still continued for some conferences, albeit in a virtual format.

The 5 Sessions We Are Most Excited for at Virtual Black Hat USA 2020

Events

The 5 Sessions We Are Most Excited for at Virtual Black Hat USA 2020

We are still on course for an interesting Black Hat so we thought it would be helpful to highlight some of the sessions we are the most excited for. 

Post-incident Review and the Big Data Problem

Incident Response

Post-incident Review and the Big Data Problem

Security teams that have accepted the post-breach mindset focus on reducing risk as much as possible through visibility and automation, instead of searching for a one-size-fits-all solution.

What Modern Ransomware Looks Like

Ransomware

What Modern Ransomware Looks Like

Over the past year, we have seen many different types of ransomware attacks evolving, especially evolving into multistage ransomware that not only ransoms data, but also exfiltrates as much data as possible. This blog explores three of the most common modern ransomware attacks we are seeing today. 

Next-generation Antivirus 101: Layers of Prevention

Next Generation Antivirus

Next-generation Antivirus 101: Layers of Prevention

Next-generation antivirus combines traditional antivirus with behavioral-based prevention to find prevent more evasive threats than legacy antivirus alone.

Love Your Enemies Before You Destroy Them — Hacking for Good

Cybersecurity

Love Your Enemies Before You Destroy Them — Hacking for Good

Proactive defense is about predicting, understanding, and preventing as many moves as possible that an attacker could make against you. You have to stay a step ahead of the enemy and lure them into a trap of your own.

IOCs vs. IOBs

Malware

IOCs vs. IOBs

IOCs are valuable when preventing known malware, but over 350,000 new strains of malware are detected every day, and fileless malware attacks are on the rise. IOCs are no longer an innovative or sufficient standalone method for defense. 

What is the MITRE ATT&CK Framework?

MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework?

MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a model and knowledge base of adversary behavior that has become a staple of the endpoint security space.