<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">
Cybereason + Arm: Securing The Core of IoT
LEARN MORE →
Securing IoT
LEARN MORE →

Pervasive Brazilian financial malware targets bank customers in Latin America and Europe

Cybereason’s Nocturnus team analyzed numerous campaigns related to Brazilian financial malware and found that these programs have become pervasive and infected 60 banks in nearly a dozen countries throughout South America, Spain and Portugal.

Negotiations Alter North Korea’s Hacking Threat

cybersecurity

Negotiations Alter North Korea’s Hacking Threat

The upcoming talks between the U.S., South Korea and North Korea could see the DPRK change its hacking tactics to focus more on espionage campaigns against the U.S. in an attempt to figure out how the Trump administration will approach the potential meeting.

Ransomware: Down but by no means out

ransomware protection

Ransomware: Down but by no means out

In this blog, Ross Rustici, Cybereason’s Senior Director for Intelligence Services, debunks a few common ransomware myths, talks about what other threats attackers may use instead and explains why organizations still need to remain vigilant against ransomware.

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

antivirus

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.

$1.2 Billion Crime Spree Ends with Arrests of Carbanak Cybercrime Gang

Featured

$1.2 Billion Crime Spree Ends with Arrests of Carbanak Cybercrime Gang

Carbanak's downfall was brought on by what ends up bringing down most organized crime groups: accounting. What remains to be seen is whether this arrest will result in a serious degradation of Carbanak’s capabilities or merely a short term hindrance while the group refocuses its activity.

GDPR's noble intentions could lead to attackers blackmailing enterprises

regulation

GDPR's noble intentions could lead to attackers blackmailing enterprises

The specter of hefty GDPR fines may motivate attackers to ask breached companies to pay them to keep the incident quiet, allowing organizations to avoid the scrutiny and penalties that the regulation imposes on businesses that expose personal data.

A tale of two destructive attacks

destructive cyberattacks

A tale of two destructive attacks

Destructive attacks don't have to be sophisticated to cause major damage. While one targeting a petrochemical plant in Saudi Arabia was advanced, it ultimately failed. Meanwhile, NotPetya, a destructive attack that used basic techniques, significantly damaged major companies around the world.

How CISOs should talk to the board about security

How CISOs should talk to the board about security

Many security leaders are now briefing the board of directors on how they’re mitigating risks that the company faces. But how can technically-minded CISOs connect with revenue-focused board members? We talked to various security executives to find out.

Attackers include ransom note in amplified DDoS attacks that use memcached servers

Featured

Attackers include ransom note in amplified DDoS attacks that use memcached servers

Cybereason's security team on Thursday discovered that the same memcached servers used in the largest DDoS attack to date are including a ransom note in the payload that they’re serving.

GDPR Questions and Answers

GDPR

GDPR Questions and Answers

From is a ransomware attack considered a data breach under GDPR to how much can a company be fined for violating GDPR, security professionals have several questions on how the regulation impacts them. This blog answers some of them.

Attackers turn to masquerading icons to boost phishing attack’s success

Phishing

Attackers turn to masquerading icons to boost phishing attack’s success

Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome.