• Home
  • Authors
  • Israel Barak

About Israel Barak

Israel Barak

Israel Barak, Chief Information Security Officer at Cybereason, is a cyber defense and warfare expert with a background developing cyber warfare infrastructure and proprietary technologies, including that of proprietary cryptographic solutions, research and analysis of security vulnerabilities. Israel has spent years training new personnel, providing in-depth expertise related to cyber warfare and security, threat actor’s tactics and procedures. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, research and analysis of advanced threats.

All posts by Israel Barak

Biden Admin Takes Action to Defend Electric Utilities Against Cyberattacks

The plan marks the first step in a larger effort to strengthen digital safeguards at municipal water utilities, natural gas pipeline operations and more...

April 14, 2021 / 3 minute read

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical infrastructure providers.

June 11, 2020 / 6 minute read

Operation Escalation: How click-fraud malware transforms into an advanced threat

Cybereason research clearly shows that companies should not be so quick to dismiss low-level threats. While the common belief is click-fraud malware, adware and similar programs annoy users but pose a relatively minor threat, we’ve seen several non-targeted commodity threats evolve into more dangerous and complex programs.

July 12, 2017 / 3 minute read

How Does Ransomware Work?

Ransomware has become one of the most effective forms of cybercrime. This post explains how ransomware gets in and spreads on machines, the economics behind these operations, and more.

May 31, 2017 / 3 minute read

Why Hacking Back Rarely Works

Why Hacking Back Rarely Works

February 27, 2017 / 3 minute read

xDedic: Black Markets Making the Job of Targeted APT Actors Easier

The rise and commoditization of underground markets offering access to compromised machines introduces a new reality for security professionals.

February 23, 2017 / 3 minute read

Use behavioral analysis, not blacklisting, to protect against attacks

You wouldn't board up your home's doors and windows to prevent a break-in. So why would enterprises blacklist processes and tools to prevent attackers from using them to infiltrate their network?

October 13, 2016 / 2 minute read

What Clinton, Trump missed when debating information security

Protecting the country's infrastructure from advanced attacks is critical to our daily lives, but both candidates skipped this point and talked about flashier information security topics instead.

September 30, 2016 / 2 minute read

What the Yahoo data breach means for enterprise security

Yahoo's Web services may target consumers, but the data breach that affected 500 million of its users could have major ramifications on enterprise security.

September 22, 2016 / 3 minute read

The company you keep: why even your business could be targeted by an APT

Hackers aren't interested in only intellectual property or financial information. The access your company has to another organization can be just as valuable.

September 20, 2016 / 2 minute read

Why utility providers will benefit from the NSA's Cyber Mission Force

Your local power company's defenses are no match for the tools nation-state attackers have at their disposal.

August 29, 2016 / 3 minute read

How the Eddie Bauer POS breach can help the security industry

Companies are understandably reluctant to disclose that they've been hacked, but sharing attack details with defenders can benefit the security industry.

August 19, 2016 / 2 minute read

Cybereason Insights: Five Emerging Threats that Enterprise Security Must Not Ignore

Cybereason's researchers have analyzed customer endpoint data from the past six months to figure out what emerging threats organizations can't ignore.

June 16, 2016 / 1 minute read