Accelerate Investigations with the New Cybereason Process Timeline Feature
The Cybereason Process Timeline view provides threat hunters with a unified timeline of events and full visibility of activity that happened on the endpoint...
Paul Stamp
A couple of days ago, Kaspersky wrote about a large increase in fileless malware attacks, particularly against financial institutions. This was reported widely - in particular, this thoughtful piece by Dan Goodin at ArsTechnica. According to Goodin and Kaspersky, 140 banks across 40 countries have been affected, and the number could be even higher.
These attacks reside almost completely in memory, and use legitimate system administration tools - like PowerShell - to execute and propagate. This combination makes them almost impossible to detect using conventional anti-malware and endpoint protection tools.
The increasing prevalence of fileless malware attacks is a big reason why organizations are looking to Cybereason to detect, investigate and disrupt these types of attacks. Cybereason offers:
- The most advanced detection platform in existence today that performs behavioral and statistical analysis of these attacks. The video below shows an example of Cybereason detecting similar attacks.
- Active Monitoring Services to provide 24x7 operations and provide specialized assistance in investigating and responding to these attacks.
- Hunting Services to deploy rapidly in your environment to seek out and destroy ongoing attacks that use advanced attack techniques like fileless malware.
This short video showcases some of the Cybereason capabilities in this arena.
Paul is the former Director of Product Marketing at Cybereason.
The Cybereason Process Timeline view provides threat hunters with a unified timeline of events and full visibility of activity that happened on the endpoint...
The Cybereason Historical Data Lake ingests all available telemetry collected for analysis for two primary use cases: Historical Threat Hunting and Deep Investigation...
The Cybereason Process Timeline view provides threat hunters with a unified timeline of events and full visibility of activity that happened on the endpoint...
The Cybereason Historical Data Lake ingests all available telemetry collected for analysis for two primary use cases: Historical Threat Hunting and Deep Investigation...
Get the latest research, expert insights, and security industry news.
Subscribe