<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">
Cybereason + Arm: Securing The Core of IoT
LEARN MORE →
Securing IoT
LEARN MORE →

Wannamine cryptominer that uses EternalBlue still active

Research

Wannamine cryptominer that uses EternalBlue still active

The Wannamine cryptominer, which uses the EternalBlue exploits, is still active although a patch that fixes these well-known vulnerabilities was released last March. Amit Serper, Cybereason's head of security research, examines this variant and makes the case for patching your systems.

The anatomy of a .NET malware dropper

Cybersecurity

The anatomy of a .NET malware dropper

Attackers don't need sophisticated tools to create effective malware. Basic tools work just fine. Case in point: Cybereason researchers discovered a .NET dropper/crypter. Here's how they reverse engineered it.

Cybereason CISO Interview Series: Protecting all the news that’s fit to print and the peacock network

CISO

Cybereason CISO Interview Series: Protecting all the news that’s fit to print and the peacock network

Mike Higgins, who's served as CSO of The New York Times and CISO of NBC Universal, talks about why nation-states were interested in attacking the paper of record, why media companies were slow to realize the importance of information security and why you don’t have to be a technical expert to pursue a security career.

Stopping the bad guys, part two

Events

Stopping the bad guys, part two

Cybereason is launching our Ai Hunting Tour - a cross-country road show - in just a few short weeks. We’re scheduled to visit 34 cities and more always seem to be added. If you’re a CISO, an analyst, or anything in between - there’s going to be something for everyone.

Your questions answered from the AI Hunting in Action webinar

Artificial Intelligence

Your questions answered from the AI Hunting in Action webinar

From does Cybereason detect fileless malware attacks that use PowerShell to how Cybereason uses artificial intelligences to detect advanced attacks, here are answers to some of the questions we received after our AI Hunting in Action webinar.

ICS Threat Broadens: Nation-State Hackers Are No Longer The Only Game In Town

IoT

ICS Threat Broadens: Nation-State Hackers Are No Longer The Only Game In Town

APT actors and nation states aren't the only adversaries interested in ICS environments. Threat actors who use sophisticated techniques but are also amateurish are now targeting utility providers. That's according to the data from a honeypot Cybereason setup to emulate the power transmission substation of a major electricity provider.

How to navigate events that can either make or a break a CISO's career: large-scale projects and tech replacement

CISO

How to navigate events that can either make or a break a CISO's career: large-scale projects and tech replacement

Large-scale and tech projects require CISOs to be the voice of risk, foster change and demonstrate operational excellence. But even the most talented security leaders can’t excel in all three areas. Sam Curry, Cybereason's CSO, explains how security leaders can pull off these projects without losing their jobs.

Cybereason CISO Interview Series: From protecting the president to securing bitcoin wallets

CISO

Cybereason CISO Interview Series: From protecting the president to securing bitcoin wallets

Tom Pageler protected the president as a Secret Service agent, helped detect fraudulent credit card transactions at Visa and holds three graduate degrees. In this interview he explains how this diverse background prepared him for the job of CSO at blockchain security company BitGo.

From CISO to CISO: Sam Curry answers security executives top leadership questions

CISO

From CISO to CISO: Sam Curry answers security executives top leadership questions

From how security departments can be brought into large projects early on to what are some the biggest career mistakes as CISO can make to what events should security leaders attend, Cybereason CSO Sam Curry fielded several questions on security leadership

How to navigate events that can either make or a break a CISO's career: mergers and acquisitions and audits and penetration testing

CISO

How to navigate events that can either make or a break a CISO's career: mergers and acquisitions and audits and penetration testing

Mergers and acquisitions mean that two companies are making a massive bet on their futures. For CISOs, their futures are also at stake. The joining of two organizations brings security risks that could hurt the merger or impact the revenue of the organizations involved. Cybereason CSO Sam Curry, a veteran of 14 mergers and acquisitions, discusses how security leaders can handle these events in a way that doesn't impact their careers.