Grief Gang’s New Quadruple Extortion Scheme Doesn’t Change the Game

A new twist from the Grief Gang ransomware group raises the ransomware stakes to quadruple extortion, but it doesn't matter. The only effective defense against ransomware is to stop it before it gets to the extortion phase.

September 17, 2021 / 2 minute read

CISO Stories Podcast: Communications Before, During and After a Breach

Melanie Ensign joins the podcast to explain how security teams benefit from relationships with the communications and public relations specialists before, during and after a breach event - check it out...

September 16, 2021 /

Four Considerations for Evaluating XDR Platforms

There’s a growing need for the more holistic approach to threat detection and response that XDR can deliver. Why? Just look at what’s going on in the digital threat landscape...

September 15, 2021 / 3 minute read

Three Pillars of Infosec: Confidentiality, Integrity and Availability

When in doubt, return to the basics and make sure you are excelling in those areas before following industry trends that may or may not improve your security posture...

September 15, 2021 / 5 minute read

Update Your Apple Devices to Guard Against Pegasus Spyware Attacks

Apple released updates to address no-click zero-day exploits being used to push spyware onto devices of unsuspecting users. Now that the flaws are public, there is greater urgency to apply the updates before other threat actors try to take advantage of them...

September 14, 2021 / 2 minute read

What is Driving the Surge of Ransomware Attacks?

More digital infrastructure means organizations have more assets that attackers can use as attack vectors to establish a foothold on the network before moving laterally and deploying their ransomware payloads...

September 14, 2021 / 3 minute read

Azurescape Vulnerability: More Evidence that  Microsoft Should Leave Security to the Experts

Microsoft is selling broken software and also offering to sell you the security tools to mitigate the risk they introduce. Microsoft should focus on securing its own products and leave cybersecurity to the experts...

September 13, 2021 / 2 minute read

Malicious Life Podcast: The Tesla Hack

A mysterious stranger approached an employee of Tesla's Gigafactory and offered him 1 million dollars to insert a malware-laden USB flash drive into a company computer - check it out...

September 13, 2021 /

Gartner Report: 2021 Competitive Landscape for Endpoint Protection Platforms

Cybereason delivers superior endpoint protection against sophisticated attacks through multi-layered prevention, AI-powered behavioral detection and comprehensive response...

September 13, 2021 / 1 minute read

Microsoft Zero-Day-of-the-Month Club

Microsoft alerted customers to yet another zero-day flaw being exploited in the wild. There will continue to be zero-day vulnerabilities, but organizations need to defend against attacks anyway...

September 10, 2021 / 3 minute read

THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability

The Cybereason GSOC Managed Detection and Response (MDR) team is investigating CVE-2021-40444, a critical vulnerability in the Microsoft Hypertext Markup Language (MSHTML) web content rendering engine that Microsoft Office applications use...

September 10, 2021 / 3 minute read

UN Breach Highlights Escalation of Cyber Threats

It is no surprise that the UN would be a cyber attack target, and there is no shame in being attacked. The fact that the attack involved a compromised username and password is the real problem...

September 9, 2021 / 2 minute read

CISO Stories Podcast: The Unpatchable Vulnerability that is Human Nature

Rachel Tobac delves into social engineering where she leverages her background in neuroscience and behavioral psychology to exploit the unpatchable vulnerability that is human nature - check it out...

September 9, 2021 /

Ransomware Attackers Don’t Take Holidays

Cybereason CSO Sam Curry provides insight on the trend of holiday ransomware attacks and the attack against Howard University over Labor Day weekend...

September 8, 2021 / 2 minute read

Cybereason’s Lodrina Cherne Joins Panel on Building a More Inclusive Future in Cybersecurity

"Rather than focusing on how far cybersecurity has to go to represent more views and voices, I hope attendees come away with actions they can take today to support diversity across schools and workplaces..."

September 8, 2021 / 1 minute read

Cybereason and Smarttech247 Partner to Deliver Managed Detection and Response

Cybereason is joining forces with Smarttech247 to defend joint customers through managed detection and response services that block cyber attacks on endpoints anywhere on their networks...

September 8, 2021 / 1 minute read

Busted: Taking Down Ransomware Attackers

The attention surrounding ransomware might be unprecedented this year, and law enforcement has brought ransomware actors to justice in the past. Let’s look at a few examples...

September 8, 2021 / 3 minute read

Malicious Life Podcast: Understanding China’s Cyber Culture

Lt. Colonel (Ret.) Bill Hagestad examines how China's culture and troubled history of western colonialism influenced its government views regarding the internet and its interactions with western tech companies...

September 7, 2021 /

Microsoft Vulnerability Exposes Thousands to Risk…Again

Microsoft leverages its dominance in the enterprise market to try and push its security tools, but repeated security failures and massive breaches demonstrate that organizations shouldn't trust their security to Microsoft. It takes an operation-centric approach and a company dedicated to one thing--protecting customers against attacks.

September 2, 2021 / 2 minute read

Cybersecurity is National Security

President Biden invited tech CEOs to the White House to improve cybersecurity across the nation - the summit resulted in some bold initiatives that are a step in the right direction, but there is still more to be done...

September 2, 2021 / 2 minute read

CISO Stories Podcast: Did You Ask For (and Get) Too Much Security Budget?

What happens when you get the funding you asked for? CSO James Christiansen joins the podcast to discuss security budgeting lessons learned you won’t want to miss - check it out...

September 2, 2021 /

The Value Drivers for an XDR Investment

Consider the value that stopping a ransomware attack at initial ingress or at lateral movement on the network versus a costly and disruptive incident response scramble and “roll-back” of encryption on every affected system...

September 1, 2021 / 4 minute read

ESG Research Report: 2021 Trends in Endpoint Security

Though there is no explicit definition of an endpoint protection platform (EPP), but there are qualifications for what a good solution looks like - download the complimentary ESG report to learn more...

August 31, 2021 / 1 minute read

Evolving Ransomware Tactics Include Recruiting Insiders and DDoS Attacks

Ransomware gangs are targeting insiders to give them network access as well as threatening targets with DDoS attacks if they refuse to pay a ransom demand in double extortion schemes...

August 31, 2021 / 3 minute read

THREAT ALERT: Microsoft Exchange ProxyShell Exploits and LockFile Ransomware

The exploitation of the ProxyShell vulnerabilities enables attackers to execute arbitrary commands on compromised systems, which may lead to full system compromise and/or the deployment of malware...

August 30, 2021 / 3 minute read

Malicious Life Podcast: The Life and Times of John McAfee

What do you get when you take a gun-toting cybersecurity pioneer and add a serious amount of money to the mix? You get John McAfee's unbelievable life and times - check it out...

August 30, 2021 /

Afghanistan, the Taliban and National Security

It's been a chaotic week with the situation in Afghanistan and the alleged cyber attack at the US State Department. Cybereason CEO Lior Div shares his thoughts on the implications for national security and what it means for cybersecurity in general...

August 26, 2021 / 2 minute read

CISO Stories Podcast: Practical Considerations for Managing Your MSSP

Jonathan Nguyen-Duy, VP Field CISO Team, joins this podcast to discuss strategies for working with MSSPs to ensure that your organization is obtaining the most value - check it out...

August 26, 2021 /

How XDR Delivers on SOAR’s Unfulfilled Promises

After being around for years, has SOAR really delivered on any of the lofty promises? Ask any user, and their answer will most likely be “kind of" because analysts still need to manually intervene and sift through all the “well organized noise...”

August 25, 2021 / 4 minute read

Implications of the Alleged State Department Breach

Cybereason CSO Sam Curry shares his thoughts on the alleged cyber attack against the US State Department and the potential implications for cybersecurity for both government agencies and private sector organizations...

August 24, 2021 / 2 minute read

Cybereason vs. LockBit2.0 Ransomware

Following the rise of the new LockBit2.0 and the attack against the global IT company Accenture, this report provides detailed information about the attack process and how the Cybereason Defense Platform detects and prevents this threat at several stages...

August 24, 2021 / 6 minute read

Webinar: Extended Detection and Response (XDR) - Past, Present and Future

What is XDR, how is it different, and can it actually stop today’s malicious operations? In this special webinar session, learn about the evolution of XDR today and where it's heading in the future...

August 23, 2021 /

Malicious Life Podcast: Ten Years On - Are We Doing Security Right?

So how far have security solutions and capabilities come in a decade? Art Coviello, former CEO of RSA Security, is joined by Malcolm Harkins, former CSO at Intel, to discuss the cybersecurity landscape 10 years after the RSA Breach - check it out...

August 23, 2021 /

T-Mobile and BlackBerry: More Lessons Learned the Hard Way

T-Mobile and BlackBerry made the news this week, but there are cybersecurity headlines every week. The lesson we need to learn from these events is that organizations need to be able to detect and stop malicious operations regardless of the latest vulnerability or data breach...

August 19, 2021 / 2 minute read

CISO Stories Podcast: Achieving Security Buy-In - Change Approach Not Culture

David Nolan, Vice President of Information Security at Aaron’s, joins the podcast to discuss how to achieve consensus on security in the organizations - check it out...

August 19, 2021 /

BlackBerry QNX Vulnerability Highlights Lurking Issues with IOT Security

If your customers don’t demand security, and you aren’t rewarded for investing in it, there’s little market incentive to fix it by making the necessary investments. In fact, there’s generally a complete market failure when it comes to security, and IOT is no exception...

August 18, 2021 / 3 minute read

Three Reasons Why You Should Never Pay Ransomware Attackers

After falling prey to a ransomware attack, most organizations are faced with the decision of whether they’re going to pay the ransom demand. We’ll save you some time: it’s not worth it, and here are three of the many reasons why it does not pay to pay...

August 18, 2021 / 4 minute read

Gartner Report: How to Prepare for Ransomware Attacks

Security and risk management leaders need to look beyond the endpoints to help protect the organization from ransomware - fine-tuning incident response processes is a key component for successful mitigation of these multi-stage attacks...

August 17, 2021 / 1 minute read

T-Mobile Data Breach Amplifies Larger Cybersecurity Challenge

What is particularly concerning with the breach is the availability of mobile phone IMEI identity numbers tied to each specific customer’s phone - the more info cybercriminals have about you, the more targeted and effective they can make their attack...

August 17, 2021 / 2 minute read

XDR: The Key to Solving SIEM Shortcomings

SIEMs were intended to solve an array of issues by using automation to better enable analysts to detect and respond to security issues more quickly. But have SIEM solutions really delivered on their promises?

August 17, 2021 / 4 minute read

Malicious Life Podcast: DeadRinger - Exposing Chinese APTs Targeting Major Telcos

Cybereason identified several attack campaigns targeting the telecoms industry across Southeast Asia that are assessed to be the work of multiple Chinese APT groups - Nocturnus Team lead Assaf Dahan discusses the implications...

August 16, 2021 /

LockBit Ransomware Wants to Hire Your Employees

Cybereason CEO Lior Div talks about the latest ransomware attacks from LockBit and the insidious new twist LockBit has introduced--openly soliciting employees to help launch ransomware attacks from the inside...

August 12, 2021 / 2 minute read

Accenture Responds Following LockBit Ransomware Attack

The way to stop complex RansomOps attacks is ultimately financial: make the cost too high, the revenue too small, and the initiative too risky. Those are the levers we must use, and the revenue part is a big one...

August 12, 2021 / 4 minute read

The Rising Threat from LockBit Ransomware

The LockBit ransomware gang has been making headlines recently with a push to recruit inside help for its ransomware-as-a-service platform and a compromise of global consulting giant Accenture...

August 11, 2021 / 3 minute read

CISO Stories Podcast: Hacking Your Way Into Cybersecurity

Kerissa Varma discusses the security skills shortage and her initiative to recruit people from fields who have skill sets applicable to security, but they might not even know it - check it out...

August 11, 2021 /

Webinar: REvil Ransomware - Pick Your Path

How would you and your organization handle a major ransomware attack? Join us for a tabletop exercise where we will walk your organization through a REvil ransomware attack as if it were on your infrastructure...

August 10, 2021 / 1 minute read

Who Are the Main Targets of Ransomware Attacks?

With RansomOps attacks, the goal is to choose a target that is in a sensitive industry like critical infrastructure, as well as selecting targets based on their ability to pay an incredibly large ransom demand...

August 10, 2021 / 4 minute read

XDR: The Next Step in Threat Detection and Response

XDR frees security analysts from tedious manual tasks through automation for enhanced threat detection and response, allowing them to focus on their organizations’ overall security posture...

August 9, 2021 / 3 minute read

Malicious Life Podcast: The Jester - Hacktivist for Good

The Jester is a patriotic, pro-American Hacktivist that since 2010 has waged a personal cyberwar against an array of targets. So, who is The Jester and what can we make of his reported exploits? Check it out…

August 9, 2021 /

‘DeadRinger’ Reveals Pervasive Cyber Espionage Campaign

Cybereason CEO Lior Div shares his thoughts on the DeadRinger report from the Cybereason Nocturnus team and the implications it has for cyber espionage and international rules of engagement for cyber attacks...

August 6, 2021 / 2 minute read

CISO Stories Podcast: Managing the Security Product Salesperson

Kevin Morrison, CISO at Alaska Air Group, joins the podcast to discuss strategies for dealing with salespeople and selecting the best products for the organization - check it out...

August 5, 2021 /

Partners in Crime: How Ransomware Gangs Are Working Together

Ransomware actors are working together to maximize their profits, but that raises some questions, like what does collaboration between ransomware groups look like?

August 4, 2021 / 3 minute read

DeadRinger: Exposing Chinese Threat Actors Targeting Major Telcos

Cybereason discovered several previously unidentified attack campaigns targeting the telecoms industry across Southeast Asia assessed to be the work of several prominent Chinese APT groups...

August 3, 2021 / 27 minute read

Webinar: DeadRinger - Exposing Chinese Threat Actors Targeting Major Telcos

Join us for a live webinar on Thursday, August 12th, at 1:00 PM ET / 10:00 AM PT where we will walk through the Chinese espionage operations targeting telecoms providers uncovered in the DeadRinger report...

August 3, 2021 / 2 minute read

What the Growing Costs of a Data Breach Means for the Business

These findings highlight the need for organizations to defend themselves against ransomware attacks and other costly security incidents by working with a trusted vendor to streamline detection and response capabilities...

August 2, 2021 / 3 minute read

Malicious Life Podcast: The State of Credit Card Security

When Albert Gonzalez was hacking the networks of retail chains credit cards were still very insecure. We are joined by special guest Sherri Davidoff, CEO of LMG Security, who discusses the past and present state of credit card security - check it out…

August 2, 2021 /

CISO Stories Podcast: Ransomware Attacks and the True Cost to Business

An esteemed panel of subject matter experts examine recent research findings on ransomware attacks and the impact to businesses, and discuss how to prepare to defend against them - check it out...

July 30, 2021 /

Cybereason Offers Comprehensive Visibility and Protection for Diverse Systems

Following that POC, it became clear to me that Cybereason is a no-brainer for cutting edge technology companies heavily leveraging Linux in their product environments and Macs for employees. Simply put, there is no better EDR solution on the market...

July 29, 2021 / 3 minute read

CISO Stories Podcast: Developing Secure Agile Code Quickly is Very Achievable

Special guest Glenn Kapetansky, CSO Tat Trexin Consulting, discusses how security can be embedded into agile software development to produce fast and secure code - check it out...

July 28, 2021 /

The XDR Advantage: Eliminate Dwell Time and Gain Visibility

XDR provides organizations all they need to pinpoint, understand, and then stop attacks wherever they are on the network by taking an operation-centric approach to security...

July 27, 2021 / 3 minute read

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 3

A fateful meeting between a U.S. Secret Service agent and a notorious European carder marks the beginning of the end for Albert Gonzalez and his 'All Star' crew of hackers...

July 26, 2021 /

CISO Stories Podcast: Protecting the Crown Jewels

Join this podcast with special guest Steve Durbin, Chief Executive at ISF, to learn the importance of protecting critical assets throughout the information life cycle - check it out...

July 22, 2021 /

Cybereason and CYDERES Partner to Deliver Managed Detection and Response

Cybereason is thrilled to announce a strategic partnership with CYDERES, the security-as-a-service division of Fishtech Group, to bring enhanced Managed Detection and Response (MDR) to our current and future managed security customers...

July 22, 2021 / 2 minute read

Everything Cybereason at the Black Hat 2021 Virtual Conference

Cybereason invites you join us at Black Hat 2021 on August 4th/5th - sessions with our SMEs will cover advanced RansomOps, how XDR leverages Indicators of Behavior to detect and remediate against attacks faster, and more...

July 21, 2021 / 3 minute read

Three Ransomware Attacks that Upped the Ante

A behavior-based approach to prevention, detection and response is required for success against ransomware attacks by stopping them at the earliest stages, long before the ransomware payload can be delivered....

July 21, 2021 / 4 minute read

Cybereason Enhances XDR Offering with empow Acquisition

Cybereason is excited to announce a major step in the evolution of our innovative XDR Platform with the acquisition of security analytics company empow...

July 20, 2021 / 1 minute read

Malicious Life Podcast: Dave Kennedy on the History of DerbyCon

Dave Kennedy, one of the founders of DerbyCon, talks about the unique vibe of the conference, his fear of clowns, and why he'll never listen to a Busta Rhymes album again - check it out…

July 19, 2021 /

Cybereason vs. Prometheus Ransomware

The Cybereason Defense Platform detects and prevents Prometheus ransomware, a relatively new variant first observed in February of 2021 that has impacted more than 40 companies...

July 15, 2021 / 10 minute read

CISO Stories Podcast: Always be a Student - Always be Learning

Phil Attfield, CEO and founder at Sequitur Labs, discusses the challenges involved in the development of security policies and management frameworks at scale to support the IoT device lifecycle - check it out...

July 15, 2021 /

Cybereason Extends Global Leadership in XDR with $275 Million in Crossover Financing

This latest round of investment validates the company’s position as the preeminent innovator in delivering XDR, EDR, EPP and anti-ransomware solutions...

July 14, 2021 / 2 minute read

Cybereason Launches Global Defenders League Partner Program

The Cybereason team is excited to announce the launch of the Cybereason Defenders League, a Global Partner community designed to reward the cybersecurity industry’s most trusted advisors and solution providers...

July 13, 2021 / 2 minute read

CISO Roundtable: Ransomware Attacks and the True Cost to Business

This live webinar version of the CISO Stories Podcast brings together a panel of subject matter experts who examine recent ransomware research findings and discuss how organizations can better prepare to defend against and respond to a ransomware attack...

July 12, 2021 / 1 minute read

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 2

Special guest Sherri Davidoff continues the story where we find ShadowCrew's Gonzales working with the Secret Service on orchestrating the largest cybercrime bust in U.S history - check it out…

July 12, 2021 / 1 minute read

Cybereason and Doosan Corp Partner to Secure APAC Enterprises

Cybereason partners with South Korean Global Fortune 2000 leader the Doosan Corporation to protect enterprises from sophisticated cyberattacks on endpoints and across their networks...

July 11, 2021 / 2 minute read

Summer Webinar Series with CSO Sam Curry

Join Cybereason CSO Sam Curry for this webinar series where he revisits some of the cybersecurity highlights of the first half of 2021, from the SolarWinds supply chain attacks to DarkSide and other major ransomware operations...

July 9, 2021 / 1 minute read

CISO Stories Podcast: CISO Business Enablement - Getting to Yes

CSO Dan Lohrmann discusses how he faced a dilemma where he was asked to implement a technology despite the fact that the technology was insecure - check it out...

July 8, 2021 /

REvil Ransomware Attacks: Implications for Kaseya, MSPs and Businesses

With great power comes great responsibility, and it’s time for everyone to ask not just 'how could my supply chain be used against me?' but also 'how could I be used against those I supply?'

July 7, 2021 / 4 minute read

Cybereason vs. REvil Ransomware: The Kaseya Chronicles

Cybereason detects and blocks REvil ransomware, protecting our customers and those of our Managed Services Provider partners in the wake of the Kaseya supply chain attacks...

July 6, 2021 / 5 minute read

Malicious Life Podcast: Jeff Moss on the History of DEF CON

Jeff Moss discusses the origins of DEF CON and its interesting relationship with law enforcement and the intelligence community over the years...

July 6, 2021 /

THREAT ALERT: PrintNightmare Critical Vulnerability in Windows Print Spooler

PrintNightmare is a critical vulnerability in the Windows Print Spooler service that allows attackers to execute arbitrary code on target systems with administrative privileges...

July 2, 2021 / 3 minute read

CISO Stories Podcast: Why Relationships Matter if You Want to Elevate Security

CISO Mark Weatherford navigates the rough waters by focusing on relationships and his knowledge of security activities across government - check it out...

July 1, 2021 /

What SMBs Need to Know about Ransomware Attacks

The disruption of critical business operations is shared across all industry verticals and organizations of all sizes, including small to midsize businesses...

June 30, 2021 / 3 minute read

Malicious Life Podcast: The Life and Exploits of Albert Gonzales Part 1

Special guest Sherri Davidoff has skillfully researched the fascinating life and exploits of Albert Gonzales, as detailed in her book Data Breaches - check it out…

June 28, 2021 /

Ransomware Attacks: Will G7 and Biden-Putin Summits Prove Fruitful?

Cybereason CEO Lior Div shares his thoughts on the recent G7 meeting, the summit between Biden and Putin, and what it means for cybersecurity moving forward...

June 25, 2021 / 2 minute read

THREAT ALERT: SolarMarker Backdoor

SolarMarker enables attackers to execute commands, PowerShell scripts, and Windows executables on compromised systems, and to deploy additional malware...

June 23, 2021 / 3 minute read

CISO Stories Podcast: Fixing the Talent Shortage - Cybersecurity Talent Initiative

Special guest Alexander Niejelow, SVP for Cybersecurity at Mastercard discusses the Cybersecurity Talent Initiative, a public/private partnership which provides student loan assistance...

June 23, 2021 /

Malicious Life Podcast: History of the THOTCON Hacking Conference

How did a small-scale event in Chicago grow to become a major hacker conference? THOTCON co-founders Nick Percoco and Jonathan Tomek reveal all - check it out…

June 22, 2021 /

XDR: The Key to Higher Education’s Fight Against Ransomware

XDR provides a prevention-first strategy for early detection to stop disruptive ransomware attacks before damage is done to the organization....

June 21, 2021 / 3 minute read

CISO Stories Podcast: So You Want to be a Cyber Spy?

Ira Winkler recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author...

June 17, 2021 /

Biden-Putin Summit and Why Threat Actors Just Won’t Give it a Rest

Will a Biden-Putin photo op at a joint press conference lead to agreements around reigning in the threat actors that Putin harbors in Russia?

June 17, 2021 / 3 minute read

Report: Ransomware Attacks and the True Cost to Business

A new global research study conducted by Cybereason reveals that the majority of organizations suffered significant business impact following a ransomware attack...

June 16, 2021 / 2 minute read

Deja Vu: What Do NotPetya and SolarWinds Have in Common?

Cybereason CEO Lior Div shares the experience of battling against NotPetya and the parallels that make the SolarWinds attack feel like deja vu...

June 15, 2021 / 3 minute read

Russia’s Offer to Extradite Attackers - and a Grain of Salt

Only time will tell if Russian is willing to give up threat actors - but organizations don’t have the luxury of time when it comes to defending themselves...

June 15, 2021 / 3 minute read

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 3

Special guest Lieutenant Colonel, USMC (retired) Bill Hagestad, a leading international authority on cyberwarfare and Chinese cyber operations and capabilities...

June 15, 2021 /

Ransomware Attacks are Evolving: What You Need to Know

We’ve observed ransomware threat groups using multiple leverage points to extort their victims - here are a few tactics that stood out to us...

June 14, 2021 / 4 minute read

CISO Stories Podcast: No Insider Cybersecurity Risk? Guess Again!

Special guest Dawn Cappelli, VP Global Security and CISO at Rockwell Automation, discusses strategies to build a better insider risk program to mitigate these threats - check it out...

June 9, 2021 /

DOJ Recovers $2.3M in Bitcoin Ransom Paid by Colonial Pipeline

The enormity of the cybercrime ecosystem makes it nearly impossible to recover most ransoms - that’s the way things stand now...

June 8, 2021 / 3 minute read

Webinar: Live Ransomware Attack Simulation

Join us for a live ransomware attack simulation, where we’ll discuss the latest attack trends, walk through a multi-stage ransomware attack...

June 8, 2021 / 1 minute read

Malicious Life Podcast: Inside the DarkSide Colonial Pipeline Attack

Threat researcher Assaf Dahan examines the DarkSide attack on Colonial Pipeline, and the implications for the security of critical infrastructure...

June 8, 2021 / 1 minute read

Market Drivers for XDR and MSSP Service Opportunities

Examine market drivers for XDR adoption and how MSSPs can take advantage of the enhanced detection and response capabilities XDR...

June 7, 2021 / 3 minute read

CISO Stories Podcast: CISOs Cross the Bridge to the Cloud

Join special guest Jim Reavis, CEO at the Cloud Security Alliance, to learn how to use appropriate controls to manage cloud environments securely...

June 3, 2021 /

Cybereason vs. REvil Ransomware

The Cybereason Defense Platform detects and blocks REvil ransomware, allowing defenders to protect their organizations from this evolving threat...

June 2, 2021 / 2 minute read

Cybereason Joins with MITRE Engenuity’s Center for Threat-Informed Defense

Cybereason is committed to working with the MITRE Engenuity Center for Threat-Informed Defense to develop better defense strategies that reverse the adversary advantage...

June 2, 2021 / 2 minute read

SolarWinds Threat Actors Behind New Email Attack Campaign

Threat actors like these use the same advanced R&D techniques and agile principles that we’ve been championing in cutting-edge development and technology labs for years...

June 1, 2021 / 3 minute read

The Line in the Sand: How We Respond Today Impacts Our Security Tomorrow

Cybereason CEO Lior Div shares his thoughts on how the United States needs to respond today in order to draw a line in the sand and prevent major attacks...

June 1, 2021 / 3 minute read

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 2

Nortel was positioning itself China's partner, not knowing it was China's primary target for corporate espionage and 'Unrestricted Warfare' doctrine...

June 1, 2021 /

XDR: Moving Beyond the Limits of SIEM and SOAR

SIEM, SOAR and EDR technologies have their benefits, but organizations need to move beyond - that’s where XDR comes into play...

May 27, 2021 / 4 minute read

Ransomware Trends: Six Notable Ransomware Attacks from 2021

Several ransomware incidents made headlines in 2021 - here are six events that stood out among the rest...

May 26, 2021 / 3 minute read

Cybereason Makes Big Debut on CNBC 2021 Disruptor 50 List

Learn how Cybereason helps organizations around the world outthink and outpace threat actors...

May 25, 2021 / 2 minute read

CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

Roland Cloutier, Global CSO at TikTok, discusses five critical elements for developing an effective Critical Asset Protection Program (CAPP) - check it out...

May 25, 2021 /

New Cybersecurity Executive Order: Will It Have Impact?

Biden's Executive Order (EO) focuses on response, reporting, and reinforcing, but how can we ensure that attackers know there are consequences?

May 25, 2021 / 3 minute read

Record Setting $40M Ransom Paid to Attackers

There have been significant advances in EPP to better prevent ransomware, but quality EDR is the ransomware killer that can counter its proliferation...

May 24, 2021 / 3 minute read

Malicious Life Podcast: The Untold Story of the RSA Breach Part 2

No longer bound by NDA, former RSA execs share the untold story behind one of the most impactful attacks of all time - check it out...

May 24, 2021 / 1 minute read

Webinar: XDR or EDR: How Should Your SOC Choose?

Companies are struggling with security issues due to a lack of visibility and a shortage of skilled staff - can XDR help?

May 21, 2021 / 1 minute read

Malicious Life Podcast: The Untold Story of the RSA Breach Part 1

No longer bound by NDA, former RSA execs tell how the infamous breach unfolded and share the untold story behind one of the most impactful attacks of all time - check it out...

May 20, 2021 / 1 minute read

THREAT ALERT: LemonDuck Crypto-Mining Malware

LemonDuck is a cryptocurrency-mining malware that in addition to mining, also spreads in a network after the initial infection with the goal to increase the number of systems that participate in its mining pool. ..

May 19, 2021 / 3 minute read

Cybereason Experts Take Center Stage at RSA Conference 2021

Cybereason is excited to announce that CISO Israel Barak and Principal Security Advocate Lodrina Cherne are taking center stage at the RSA Conference...

May 19, 2021 / 2 minute read

SC Awards Europe: Cybereason Named Finalist for Best Endpoint Security

Cybereason is excited to announce it was named a finalist in the Best Endpoint Security category of the 2021 SC Awards Europe competition...

May 19, 2021 / 1 minute read

Evaluating XDR Against EDR, SIEM and SOAR Solutions

XDR, short for Extended Detection and Response, has emerged the best option for defending the modern corporate IT infrastructure...

May 19, 2021 / 3 minute read

Unpacking the Gartner Critical Capabilities Research

The Gartner Critical Capabilities Report breaks down product capabilities customer profile and the vendors most suitable by customer use case and needs...

May 18, 2021 / 3 minute read

CISO Stories Podcast: Passion for Solving Problems is Key to Security

Will Lin, co-creator of the CISO community Security Tinkerers, discusses his passion for technology and how it led him to a career helping security companies launch and supporting CISOs through collaboration...

May 18, 2021 /

DarkSide Gang and the New Golden Age of Piracy

DarkSide's semi-state-sanctioned crime models may not specifically repeat itself throughout the ages, but it often rhymes...

May 17, 2021 / 5 minute read

Solving the Ransomware Crisis

Cybereason CEO Lior Div shares his thoughts on the global ransomware crisis and the efforts of the Ransomware Task Force to foster a collaborative "win as one" effort to develop effective strategies to address it.

May 14, 2021 / 3 minute read

Webinar: Future-Proofing Security Programs in 2021 and Beyond

Join Cybereason and Wipro to learn how to automate the automate-able, what to do to secure the apparently insecure-able, and how to future-proof security programs...

May 14, 2021 / 1 minute read

CISO Stories Podcast: Effective Health Care Security is More Than HIPAA

Hear how one healthcare CISO is having risk-based discussions at the right levels to address the security challenge...

May 13, 2021 /

Ransomware Attacks are Evolving – Is Your SOC Ready?

Ransomware actors have accelerated the evolution of the tactics and techniques designed to make the attacks more effective - is your SOC ready?

May 12, 2021 / 4 minute read

Webinar: Cybereason vs. DarkSide Ransomware

Join us live as we breakdown the DarkSide Ransomware attack and show how Cybereason fully detects and protects against this threat...

May 11, 2021 /

Malicious Life Podcast: Creating BSides - A Grassroots Security Conference

Jack Daniel recalls how the BSides conference started and what 'community-oriented' events contribute that other events often cannot - check it out...

May 11, 2021 /

Inside the DarkSide Ransomware Attack on Colonial Pipeline

Lengthy detection, investigation and response periods following a ransomware attack is too little, too late - prevention is key to defending against ransomware attacks...

May 10, 2021 / 4 minute read

THREAT ALERT: N3tw0rm Ransomware Campaign

The campaign uses a disk space filler utility, a scenario not typical for ransomware where the disk space filler utility continuously writes files on a victim’s hard disk volumes until no free disk space is left available...

May 10, 2021 / 2 minute read

Defining XDR from an MSSP Perspective

Learn about the advantages of XDR and how MSSPs and their customers can benefit versus tools like SIEM, SOAR and traditional EDR...

May 10, 2021 / 3 minute read

The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP

Cybereason is positioned furthest to the right in the Visionary Quadrant of the EPP MQ for Completeness of Vision as Cybereason continues to disrupt the endpoint protection space...

May 6, 2021 / 2 minute read

CISO Stories Podcast: Stop Reporting Useless Security Metrics!

Edward Marchewka, founder at Chicago Metrics, explains the strategy behind different measures and how they can be applied to improve performance...

May 6, 2021 /

Three Keys to a Reliable Ransomware Defense Strategy

Organizations need to prepare for ransomware attacks - here are three tips for building a successful ransomware prevention strategy...

May 5, 2021 / 4 minute read

Malicious Life Podcast: China's Unrestricted Cyberwarfare Part 1

Special guest Bill Hagestad, a leading international authority on cyberwarfare, gives us a look inside Chinese cyber operations - check it out...

May 4, 2021 /

Securing the Financial Sector Now and Into the Future with XDR

What’s keeping financial organizations from detecting and responding to attacks early enough to prevent them from becoming major breach events?

May 3, 2021 / 4 minute read

100 Days Down, 1,360 Days of Nation-State Cybersecurity Threats to Go

Cybereason co-founder and CEO Lior Div takes a look at how the Biden team is addressing cybersecurity challenges as the administration hits the 'first 100 days' milestone...

April 30, 2021 / 3 minute read

PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector

In a highly targeted operation by a Chinese APT, a newly discovered backdoor dubbed PortDoor is being used in attacks targeting a Russian defense contractor...

April 30, 2021 / 7 minute read

CISO Stories Podcast: Necessity is the Mother of Security

Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the protocol and the application of technological solutions to security challenges...

April 29, 2021 /

Webinar: The Current State and Future Challenges of Security

Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss the outlook for the security industry based on recent events and trends...

April 28, 2021 /

Five Things You Need to Know About Ransomware Attacks

Here are five things you need to know about the current state of ransomware attacks and how to defend against them...

April 28, 2021 / 3 minute read

Cybereason vs. Avaddon Ransomware

Cybereason Nocturnus Team has been tracking the Avaddon Ransomware since June 2020 and the double extortion model...

April 27, 2021 / 4 minute read

Malicious Life Podcast: Can Nuclear Power Plants Be Hacked?

Andrew Ginter dives into cybersecurity challenges for Nuclear facilities - how secure are modern nuclear power plants from cyber attacks? Check it out...

April 27, 2021 /

Integrating Endpoint and Mobile Device Security

The goal of this whitepaper is to help enterprise teams reduce gaps in their security architecture and improve the endpoint and mobile experience for their users...

April 26, 2021 / 1 minute read

HAFNIUM Exploits Live On

New research shows that cybercriminals continue to target vulnerabilities in Microsoft Exchange, highlighting the need for a better approach to cybersecurity...

April 22, 2021 / 2 minute read

REvil/Sodinokibi Ransomware Gang Extorts Apple Through Supply Chain Attack

"Either REvil is benefitting indirectly from pariah policies related to cybercrime in Russia or is directly taking orders from a government." ~Sam Curry, Cybereason CSO...

April 22, 2021 / 3 minute read

Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

The multi-stage cryptocurrency botnet has been observed exploiting the Microsoft Exchange vulnerabilities associated with the HAFNIUM attacks to penetrate networks...

April 22, 2021 / 15 minute read

MITRE ATT&CK: Cybereason Dominates the Competition

The Cybereason Defense Platform dominated due to its ability to prevent and detect the advanced tools, tactics and procedures used in the MITRE evaluations emulating real-world scenarios...

April 21, 2021 / 2 minute read

Inside Effective EDR Evaluation Testing

We go into some of the methodology of EDR and we analyze “testing tools" to demonstrate the flaws in their use and explain why the results are unreliable when pitted against a modern EDR system...

April 21, 2021 / 9 minute read

CISO Stories Podcast: He Fought the FTC Over a Breach and Won

Hear how Mike Daugherty, CEO of LabMD, took on the FTC and mounted a multi-year defense to combat the outrageous allegations leveled by the regulatory agency...

April 21, 2021 /

Cybereason Excels in 2020 MITRE Engenuity ATT&CK Evaluations

The Cybereason Defense Platform achieved 100% coverage for prevention and 98% technique visibility across the 54 advanced attack techniques applied in testing...

April 20, 2021 / 2 minute read

Malicious Life Podcast: Shutting Down the Internet in 30 Minutes

Chris Wysopal, one of L0pht's founding members, talks about the group's 1998 Senate testimony and how they used shaming to force corporations to secure their software...

April 20, 2021 / 1 minute read

Ransomware Decoded: Preventing Modern Ransomware Attacks

Understand how to detect the preliminary stages of an attack, analyze the scope of the operation and prevent execution of the malicious code...

April 19, 2021 / 1 minute read

Cybereason and MassCyberCenter Partner to Mentor College Students

“There is a massive skills gap in the cybersecurity industry and we should do all we can to bridge it and to pay forward what we all received in our careers. No one advances in isolation.” ~Sam Curry, Cybereason CSO...

April 16, 2021 / 2 minute read

Webinar: MITRE ATT&CK Evaluations - Unpacking the Emulation

If your organization has a distributed attack surface, this webinar is a must - we’re seeing attackers increasingly pivot from opportunistic compromise to double extortion ransomware attacks...

April 15, 2021 / 1 minute read

CISO Stories Podcast: Is There a Magic Security Control List?

Tony Sager, a 35-year NSA software vulnerability analyst and executive, discusses how the CIS Controls can be used effectively to manage your environment...

April 15, 2021 /

Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks

The plan marks the first step in a larger effort to strengthen digital safeguards at municipal water utilities, natural gas pipeline operations and more...

April 14, 2021 / 3 minute read

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

By using double extortion, ransomware attackers can compel organizations to pay a ransom even if they are able to recover their information using data backups...

April 14, 2021 / 3 minute read

Malicious Life Podcast: The Story of LØpht Heavy Industries, Part 2

By the end of the ‘90s many of the L0pht hackers had quit their day jobs and incorporated under the name L0pht Heavy Industries...

April 13, 2021 /

Five Clear Steps to Enhance SecOps with MITRE ATT&CK

With these five steps, you can continuously tune your security strategy and leverage the connection between techniques, tactics, and procedures and real-world adversary groups...

April 12, 2021 / 1 minute read

The Cybereason Difference: Introduction to the MalOp

The MalOp provides a contextualized view of the full attack narrative correlated across all impacted endpoints and users so security analysts can respond to threats with an operation-centric approach...

April 11, 2021 / 3 minute read

CISO Stories Podcast: Doing Security Before Security Was a Career Path

Special guest Petri Kuivala, CISO at NXP Semiconductors, recounts his journey from municipal police officer to cybercrimes unit investigator to Chief Information Security Officer during the early days when security was largely an afterthought...

April 8, 2021 /

Malicious Life Podcast: The Story of L0pht Heavy Industries, Part 1

'L0pht' was one of the most influential hacker collectives of the '90s: they were even invited to testify in front of Congress on the state of Internet security. In this episode of Malicious Life, four of L0pht's members talk about the beginning and influence of the L0pht on cybersecurity. - check it out...

April 6, 2021 /

Cybereason Empowers Partners with North American MSSP Program Expansion

“Cybereason’s platform has helped us protect our clients and partners from advanced threats and has simplified our security operations,” said Justin Kallhoff, Chief Cybersecurity Officer...

April 6, 2021 / 2 minute read

Personal Info for More Than Half a Billion Facebook Users Leaked Online

Cybereason CSO Sam Curry shares insights on the news that attackers publicly exposed information from 533 million Facebook users based in 106 countries, including phone numbers, Facebook IDs, birthdates, bios, full names and locations. The dumped data also included the email addresses for a portion of the affected users.

April 5, 2021 / 3 minute read

Ransomware Defense: Three Implementations Every Security Team Needs

Ransomware attacks are continuing to accelerate at a torrid pace - but the more concerning trend is how effective they are at creating chaos & paralyzing business operations. Effective multi-layer ransomware prevention capabilities have never been more important. Here are three implementations every security team needs

April 5, 2021 / 4 minute read

CISO Stories Podcast: The Colonoscopy of CyberSecurity

The information & cybersecurity industry has no shortage of regulations, many organizations simply rundown the list of requirements, load them into a spreadsheet and check the boxes to show they are compliant. But is being compliant the same as being secure? Tune in to this CISO podcast episode with guest Lee Parrish

April 1, 2021 /

Cybereason vs. DarkSide Ransomware

DarkSide ransomware follows the double extortion trend where the threat actors first exfiltrate the data and threaten to make it public if the ransom demand is not paid, rendering backing up data as a precaution against a ransomware attack moot...

April 1, 2021 / 6 minute read

Whistleblower Accuses Ubiquiti of Downplaying Major Data Breach

The US-based technology company explained in its statement that it had found no evidence of those responsible for the intrusion having misused a user account or having gained access to its databases - but according to the whistleblower, this isn’t what happened...

March 31, 2021 / 3 minute read

FBI Pegs 2020 Cybercrime Costs at $4 Billion - Actual Losses Likely Higher

Complaints represented a 69% increase over 2019, and Cybereason CSO Sam Curry suspects that the reported losses likely represent just a fraction of the actual costs to Americans in 2020...

March 31, 2021 / 3 minute read

DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know

The Cybereason Defense Platform prevents the execution of DearCry ransomware and other malware being propagated by threat actors abusing residual elements of the recent HAFNIUM attacks on Microsoft Exchange...

March 30, 2021 / 3 minute read

Why Healthcare Security Requires an Operation-Centric Approach

Cybereason focuses on Indicators of Behavior (IoBs) to quickly identify suspicious or malicious activity, and provide the visibility, context, and intelligence customers need to take action at the earliest stages of an attack...

March 29, 2021 / 3 minute read

CISO Stories Podcast: Going All-In on a Career in Security

Mauro Israel, CISO at BIOOOS, discusses his colorful background and how he – like many in the security field – discovered his true calling late in life and was able to apply his wide range of knowledge & experience to the role of CISO in the healthcare field. Check out the new episode of the CISO stories podcast

March 26, 2021 /

Cybereason Named a Strong Performer in Forrester Wave for MDR

Cybereason MDR was one of 15 solutions included in the report from Forrester, a testament to Cybereason's superior threat hunting, multi-layer prevention and correlated behavior-based detections.

March 24, 2021 / 2 minute read

Malicious Life Podcast: Inside the HAFNIUM Microsoft Exchange Attacks

The recent HAFNIUM attacks hit tens of thousands of organizations’ Microsoft Exchange servers. What happened, what were the vulnerabilities exploited in the attack, and what can we do to defend against such attacks in the future? In this episode, Host Ran Levi is joined by Israel Barack, Cybereason CISO

March 23, 2021 /

Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand

The Sodinokibi/REvil ransomware gang has reportedly attacked multinational corporation Acer and demanded a ransom of $50 million - ransomware today is not simply an evolution of traditional malware, but an element of increasingly complex and highly targeted operations.

March 23, 2021 / 3 minute read

Malicious Life Podcast: Inside NotPetya, Part 2

Listen as we break down the chain of events from the moment NotPetya began to spread around the world to the moment it was stopped by Amit Serper who was on his way to friends when he decided to take a swipe at the malware. Catch the latest episode of the Malicious Life podcast with guest Cyber Analyst Amit Serper

March 22, 2021 /

HAFNIUM Response: Cybereason is Dedicated to Defending Our Customers

Cybereason continues to investigate the related threats to protect our customers against adversaries targeting still-vulnerable and patched but not fully remediated Microsoft Exchange servers...

March 18, 2021 / 2 minute read

Cybereason Exposes Campaign Targeting US Taxpayers with NetWire and Remcos Malware

Cybereason researchers have discovered a new campaign targeting US taxpayers with documents that purport to contain tax-related content but ultimately deliver NetWire and Remcos malware - two prolific remote access trojans.

March 18, 2021 / 4 minute read

CISO Stories Podcast: Is Cybersecurity ROI Necessary?

Business units are challenged to demonstrate ROI on their spending, why should information security departments be any different? Tune in to the latest podcast episode to learn why calculating ROI for security may not be necessary and how reducing risk involves different considerations

March 17, 2021 /

Security CEO Roundtable: Restoring Our National Cybersecurity

Watch the discussion between leading security CEOs at Cybereason's roundtable event as they are addressing increased security funding in the recently passed American Rescue Package legislation in the wake of two devastating attacks.

March 16, 2021 / 37 minute read

Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds

Cyberattacks targeting IT infrastructure systems are highly-scalable, campaign-style efforts with a widespread impact. With their high degree of success in recent months, we can expect this trend to continue in the future. Now is the time to learn how to end these attacks. Join our webinars to learn more!

March 16, 2021 / 1 minute read

SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months

“It’s one thing to have solutions in place that can detect one component of an attack, but it’s another thing to understand that individual events represent aspects of a larger malicious operation." Yonatan Striem-Amit, CTO and co-founder of Cybereason

March 15, 2021 / 3 minute read

Webinar: The State of Ransomware

Join leaders from Cybereason's Nocturnus Research and Incident Response teams as they explore insights based upon what is happening in the underground and their first-hand experience with ransomware attacks encountered in the wild.

March 12, 2021 / 1 minute read

International Women’s Day: Why Be Daring?

Let’s strive for us women to continue to push each other and ourselves to our next level constantly, to make ourselves comfortable in uncomfortable situations, and then take another step forward into the discomfort.

March 12, 2021 / 2 minute read

Live Feeds of 150K Surveillance Cameras Compromised in Verkada Breach

Digital attackers compromised the live feeds of 150,000 surveillance cameras made by enterprise security camera system manufacturer Verkada.

March 11, 2021 / 3 minute read

International Women’s Day: Girls Should Never Give Up

Although equality issues in workplaces for women have generally improved over the last few years, there is still a great deal of room for improvement...

March 11, 2021 / 3 minute read

CISO Stories Podcast: Your Job is to Make Cybersecurity Simple

The CISO position in some organizations is relatively new, but the role has actually been evolving over the past 25 years - ever since Citibank named the first CISO, Steve Katz, in 1995. Join this podcast to learn how Steve navigated the early days of security and the changes he sees in the role today...

March 10, 2021 /

International Women’s Day: “Win as One” Takes True Commitment to Diversity

"Win as One” means we succeed or fail as a team, regardless of gender identity, sexual orientation, religion, or race. I am inspired every day by this approach and the modeling of it by our management team...

March 10, 2021 / 2 minute read

International Women’s Day: Culture Add Over Culture Fit as a Catalyst for Diversity

To attract and retain more women in the tech fields, we need to change our thinking to focus on whether a candidate is a Culture Add rather than a Culture Fit...

March 9, 2021 / 2 minute read

HAFNIUM and SolarWinds Attacks Highlight Lack of Accountability

Organizations are again scrambling to assess the impact of a recently disclosed attack attributed to the Chinese state-sponsored HAFNIUM APT group that targets vulnerabilities in Microsoft Exchange. Cybereason protected all of our customers from both the SolarWinds and HAFNIUM attacks.

March 8, 2021 / 3 minute read

International Women’s Day: UbU and Lead Like a Girl

Getting ahead in business doesn’t mean suppressing my femininity, it means using the best of who I am and finding ways for that authentic me to continue to advance in business – without apologies...

March 8, 2021 / 3 minute read

CISO Stories Podcast: …and Other Useless Security Constructs

"Bob Bigman, former CISO for the CIA, simplifies the conversation by slaughtering some of the industry’s most sacred cows like risk tolerance as a key driver for security programs..."

March 4, 2021 /

CISO Stories Podcast: Without Building a CISO EQ, You May Be On Your Own

Join us as we welcome special guest Marci McCarthy, CEO and President at T.E.N. Inc., to learn how CISOs can better maintain self-awareness, exercise empathy and emotional intelligence to gain trust of others, and exercise appropriate self-care.

March 3, 2021 /

Malicious Life Podcast: Inside NotPetya, Part 1

Host Ran Levi is joined by Amit Serper, the first researcher to tackle NotPetya and provide a solution when he was Principal Security Researcher at Cybereason...

March 3, 2021 /

Defender Spotlight: Keith Barros, Seton Hall University

Top-tier defender Keith Barros of Seton Hall University discusses the successes achieved with a deployment of Cybereason solutions to secure endpoints and ramp-up students to Level1 Analyst level performance....

March 2, 2021 / 1 minute read

CISO Stories Podcast: Doing Privacy Right vs. Doing Privacy Rights

Organizations need to be conscious of where they are in reference to the ‘creepy line.’ Join this podcast with special guest Valerie Lyons to learn how to determine the data collection and processing appropriate for your organization...

February 25, 2021 /

More Money Won’t Prevent the Next SolarWinds - But Better Detection Strategies Will

We need to shift away from our reliance on IOC artifacts and leverage Indicators of Behavior (IOBs), the subtle chains of behavior that can reveal an advanced attack long before it escalates to a major security event...

February 24, 2021 / 3 minute read

Cybereason Accelerates North American Expansion with Strategic Hires

“Abigail, Stephan and Ahmed each bring unique skill sets that will have a profound impact as we continue to meet the need for future-ready security by enhancing partnerships with organizations that are in the battle with defenders everyday..." ~Eric Apple, SVP Sales at Cybereason.

February 23, 2021 / 2 minute read

Case Study: SCM Insurance Services Finds True Partnership Cybereason

“We chose Cybereason was because of our need for comprehensive detection that’s mapped to MITRE ATT&CK... and to increase the speed to mitigation...” ~Nick LaPointe, Infosec Admin for SCM Insurance Services.

February 23, 2021 / 2 minute read