<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Just Because You’re Home Doesn’t Mean You’re Safe

Research

Just Because You’re Home Doesn’t Mean You’re Safe

Cybereason’s Nocturnus team is continuing to observe hundreds of phishing attacks that use coronavirus-themed files and domains to distribute malware and infect victims all over the world.

A Note of Support to our Customers During the COVID-19 Pandemic

Company

A Note of Support to our Customers During the COVID-19 Pandemic

As an organization, our top priority continues to be providing a seamless defense for all of our customers, especially in these difficult times. As attackers take advantage of the ongoing crisis, this becomes more important than ever.

Ghost in the Machine: Reconciling AI and Trust in the Connected World

Insights

Ghost in the Machine: Reconciling AI and Trust in the Connected World

This blog is a summary of the research and perspective of Cybereason CSO Sam Curry and Dr. Alon Kaufman of Duality on AI and Privacy titled: Ghost in the Machine, reconciling AI and Trust in the Connected World.

Who's Hacking the Hackers: No Honor Among Thieves

Trojan

Who's Hacking the Hackers: No Honor Among Thieves

Cybereason Nocturnus is investigating a campaign where attackers are trojanizing multiple hacking tools with njRat, a well known RAT. Once the files are downloaded and opened, the attackers are able to completely take over the victim’s machine.

Code Integrity in the Kernel: A Look Into ci.dll

Research

Code Integrity in the Kernel: A Look Into ci.dll

This blog demonstrates how to use a subgroup of the CI API. This lets us validate Authenticode signatures in Kernel mode without implementing it ourselves.

New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor

Research

New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor

Cybereason's Nocturnus team has been tracking recent espionage campaigns specifically directed at entities and individuals in the Palestinian territories.

New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign

Research

New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign

Cybereason's Nocturnus team has been tracking recent espionage campaigns specifically directed at entities and individuals in the Palestinian territories.

The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

Malware

The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

Cybereason is following an active campaign to deliver seven different types of malware that are able to steal data, mine for cryptocurrency, and deliver ransomware to victims all over the world.

Why is Emotet So Popular and Who is it Targeting Now?

Insights

Why is Emotet So Popular and Who is it Targeting Now?

The malware previously described by DHS as the most destructive ever is surging yet again. Why is Emotet so popular and who is it targeting now?

6 of the Best Malicious Life Cybersecurity History Stories from 2019

Insights

6 of the Best Malicious Life Cybersecurity History Stories from 2019

To close out the year and celebrate seventy episodes of Malicious Life, we’re listing the best cybersecurity podcast episodes we’ve released in 2019.