Blog https://www.cybereason.com/blog Get the latest research, expert insights, and security industry news. en Tue, 29 Nov 2022 16:09:58 GMT 2022-11-29T16:09:58Z en Malicious Life Podcast: How to NOT Build a Cybersecurity Startup https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png" alt="malicious life podcast norse corp cybersecurity startup" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>When it was founded in 2011, Norse Corp.—which described itself as "the world's largest dedicated threat intelligence network"—had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millions of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/How%20to%20Not%20Build%20a%20Cybersecurity%20Startup-1.png" alt="malicious life podcast norse corp cybersecurity startup" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>When it was founded in 2011, Norse Corp.—which described itself as "the world's largest dedicated threat intelligence network"—had everything a promising startup could wish for: a charismatic and experienced founder, a rare and valuable technology, and few tens of millions of dollars from investors. Less than six years later, it all came crashing down in the most horrible death a business can experience. What went wrong in Norse Corp.?</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fmalicious-life-podcast-how-to-not-build-a-cybersecurity-startup&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Malicious Life Tue, 29 Nov 2022 16:09:58 GMT https://www.cybereason.com/blog/malicious-life-podcast-how-to-not-build-a-cybersecurity-startup 2022-11-29T16:09:58Z Malicious Life Podcast Malicious Life Podcast: Jailbreaking Tractors https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png" alt="Malicious Life podcast Jailbreaking tractors" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>John Deere, an American agricultural machinery manufacturer, has recently enraged many farmers and digital rights activists due to the restrictive fixing policy of its tractors. Now, an Australian white hat hacker named Sick Codes has demonstrated not only how he was able to jailbreak the company’s tractors and run Doom on them (because why not) - but also hack into its global operations center, demonstrating how hackers can easily take over a huge number of farming machines all over the world.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Jailbreaking%20Tractors-1.png" alt="Malicious Life podcast Jailbreaking tractors" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>John Deere, an American agricultural machinery manufacturer, has recently enraged many farmers and digital rights activists due to the restrictive fixing policy of its tractors. Now, an Australian white hat hacker named Sick Codes has demonstrated not only how he was able to jailbreak the company’s tractors and run Doom on them (because why not) - but also hack into its global operations center, demonstrating how hackers can easily take over a huge number of farming machines all over the world.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fmalicious-life-podcast-jailbreaking-tractors&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Malicious Life Mon, 28 Nov 2022 14:37:31 GMT https://www.cybereason.com/blog/malicious-life-podcast-jailbreaking-tractors 2022-11-28T14:37:31Z Malicious Life Podcast The Russian Business Network https://www.cybereason.com/blog/the-russian-business-network <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/the-russian-business-network" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png" alt="The Russian Business Network" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a ‘bullet-proof’ hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government’s years-old tradition of collaborating with organized crime, it’s no wonder that the Russian Business Network quickly became Putin’s informal cyber attack arm.</p> <div class="hs-responsive-embed-wrapper hs-responsive-embed" style="position: relative; top: 0; left: 0; width: 100%; height: auto; border: none; overflow: hidden; padding: 0; max-width: 560px; max-height: 315px; min-width: 256px; margin: 0px auto; display: block;"> <div class="hs-responsive-embed-inner-wrapper" style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0;"> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/the-russian-business-network" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/The%20Russian%20Business%20Network.png" alt="The Russian Business Network" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>In 2006 the Russian Business Network pivoted its business: the once legitimate ISP became a ‘bullet-proof’ hosting service, catering to the needs of cybercriminals. It quickly became the largest player in the Russian cybercrime landscape, with ~60% of all cybercrime activity related to Russia connected to it in some way. Following the Russian government’s years-old tradition of collaborating with organized crime, it’s no wonder that the Russian Business Network quickly became Putin’s informal cyber attack arm.</p> <div class="hs-responsive-embed-wrapper hs-responsive-embed" style="position: relative; top: 0; left: 0; width: 100%; height: auto; border: none; overflow: hidden; padding: 0; max-width: 560px; max-height: 315px; min-width: 256px; margin: 0px auto; display: block;"> <div class="hs-responsive-embed-inner-wrapper" style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.25%; margin: 0;"> <iframe class="hs-responsive-embed-iframe" style="position: absolute; top: 0; left: 0; width: 100%; height: 100%; border: none;" src="https://www.youtube.com/embed/J-khV27H_8E" width="560" height="315" frameborder="0" allowfullscreen></iframe> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fthe-russian-business-network&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Malicious Life Cybercrime Russia Putin Fri, 25 Nov 2022 13:00:00 GMT https://www.cybereason.com/blog/the-russian-business-network 2022-11-25T13:00:00Z Malicious Life Podcast What Can Chess Grandmasters Teach Us About Cyber https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png" alt="What Can Chess Grandmasters Teach Us About Cyber" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Sports is not something that you usually hear mentioned when people talk about cybersecurity – but Chris Cochran and Ron Eddings, co-founders of Hacker Valley Media, believe that cyber professionals can take inspiration from MMA wrestlers and Chess Grandchampions to get to their own version of Peak Performance.</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/What%20Can%20Chess%20Grandmasters%20Teach%20Us.png" alt="What Can Chess Grandmasters Teach Us About Cyber" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Sports is not something that you usually hear mentioned when people talk about cybersecurity – but Chris Cochran and Ron Eddings, co-founders of Hacker Valley Media, believe that cyber professionals can take inspiration from MMA wrestlers and Chess Grandchampions to get to their own version of Peak Performance.</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fwhat-can-chess-grandmasters-teach-us-about-cyber&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Cybersecurity Malicious Life Thu, 24 Nov 2022 13:00:00 GMT https://www.cybereason.com/blog/what-can-chess-grandmasters-teach-us-about-cyber 2022-11-24T13:00:00Z Malicious Life Podcast THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png" alt="THREAT ALERT:&nbsp;Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The Cybereason Global SOC (GSOC) team is investigating <a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot"><span>Qakbot</span></a> infections observed in customer environments related to a potentially widespread ransomware campaign run by <a href="https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware"><span>Black Basta</span></a>. The campaign is primarily targeting U.S.-based companies.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Black%20Basta%20Threat%20Alert.png" alt="THREAT ALERT:&nbsp;Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>The Cybereason Global SOC (GSOC) team is investigating <a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot"><span>Qakbot</span></a> infections observed in customer environments related to a potentially widespread ransomware campaign run by <a href="https://www.cybereason.com/blog/cybereason-vs.-black-basta-ransomware"><span>Black Basta</span></a>. The campaign is primarily targeting U.S.-based companies.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fthreat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Research Threat Alerts Threat Analysis Report QakBot Black Basta Ransomware Wed, 23 Nov 2022 05:01:00 GMT gti@cybereason.com (Cybereason Global SOC Team) https://www.cybereason.com/blog/threat-alert-aggressive-qakbot-campaign-and-the-black-basta-ransomware-group-targeting-u.s.-companies 2022-11-23T05:01:00Z Malicious Life Podcast: What Would Happen If CBS Got Hacked? https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png" alt="Malicious Life Podcast: What Would Happen If CBS Got Hacked?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media companies are more public facing by their very nature. How can these organizations be hacked, and why should we care about such attacks? Nate Nelson spoke with Joel Molinoff, former chief information risk officer for CBS Corporation, and Dan Vasile, former vice president of information security at Paramount.</p> <div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 200px; min-width: 256px; display: block; margin: auto;"> <div class="hs-embed-content-wrapper"> <div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.5%; margin: 0px;"> </div> </div> </div> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/What%20Would%20Happen%20if%20CBS%20Got%20Hacked.png" alt="Malicious Life Podcast: What Would Happen If CBS Got Hacked?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>Media companies probably get hacked no more than other, non-media oriented organizations such as hospitals, banks, etc. But these hacks are often more visible and more memorable because… well, media companies are more public facing by their very nature. How can these organizations be hacked, and why should we care about such attacks? Nate Nelson spoke with Joel Molinoff, former chief information risk officer for CBS Corporation, and Dan Vasile, former vice president of information security at Paramount.</p> <div class="hs-embed-wrapper" style="position: relative; overflow: hidden; width: 100%; height: auto; padding: 0px; max-width: 200px; min-width: 256px; display: block; margin: auto;"> <div class="hs-embed-content-wrapper"> <div style="position: relative; overflow: hidden; max-width: 100%; padding-bottom: 56.5%; margin: 0px;"> <iframe width="560" height="315" src="https://www.youtube.com/embed/io1PVqNV7ew" frameborder="0" allowfullscreen style="position: absolute; top: 0px; left: 0px; width: 100%; height: 100%; border: none;"></iframe> </div> </div> </div> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fmalicious-life-podcast-what-would-happen-if-cbs-got-hacked&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Malicious Life Podcast Tue, 22 Nov 2022 11:00:00 GMT https://www.cybereason.com/blog/malicious-life-podcast-what-would-happen-if-cbs-got-hacked 2022-11-22T11:00:00Z Malicious Life Podcast Malicious Life Podcast: LabMD vs. The FTC https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png" alt="Malicious Life Podcast LabMD vs FTC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>One day in 2008, Michael Daugherty - CEO and owner of LabMD, a cancer detection lab - got a call from an executive of TiVera, a cybersecurity company. The caller said that a file containing private medical data of some 9000 of LabMD's patients has been discovered online. When Michael refused to pay for TiVersa's hefty "consultation fee", it reported the incident to the FTC. This was the beginning of a ten-year-long legal battle that ultimately destroyed LabMD - but cost the Federal Agency dearly.</span></p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Malicious%20Life%20Podcast%20LabMD%20vs%20FTC.png" alt="Malicious Life Podcast LabMD vs FTC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p><span>One day in 2008, Michael Daugherty - CEO and owner of LabMD, a cancer detection lab - got a call from an executive of TiVera, a cybersecurity company. The caller said that a file containing private medical data of some 9000 of LabMD's patients has been discovered online. When Michael refused to pay for TiVersa's hefty "consultation fee", it reported the incident to the FTC. This was the beginning of a ten-year-long legal battle that ultimately destroyed LabMD - but cost the Federal Agency dearly.</span></p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fmalicious-life-podcast-labmd-vs.-ftc&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Malicious Life Fri, 18 Nov 2022 17:00:00 GMT https://www.cybereason.com/blog/malicious-life-podcast-labmd-vs.-ftc 2022-11-18T17:00:00Z Malicious Life Podcast Holiday, Weekend Ransomware Attacks Continue to Hit Companies Hard https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png" alt="impact of holiday weekend ransomware attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>As the holidays approach, security leaders wanting to give their teams some much deserved extra time off may get caught in a bind. After all, ransomware actors love to wreak havoc when organizations’ human defenses are trying to sleep in heavenly peace.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/2022%20Holiday%20Ransomware%20Study.png" alt="impact of holiday weekend ransomware attacks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>As the holidays approach, security leaders wanting to give their teams some much deserved extra time off may get caught in a bind. After all, ransomware actors love to wreak havoc when organizations’ human defenses are trying to sleep in heavenly peace.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fholiday-weekend-ransomware-attacks-continue-to-hit-companies-hard&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Ransomware Research Ransomware Attackers Don’t Take Holidays Holidays Wed, 16 Nov 2022 11:00:00 GMT meridith.levinson@cybereason.com (Meridith Levinson) https://www.cybereason.com/blog/holiday-weekend-ransomware-attacks-continue-to-hit-companies-hard 2022-11-16T11:00:00Z NGAV Redefined: 9 Layers of Unparalleled Attack Protection https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png" alt="NGAV Redefined: 9 Layers of Unparalleled Attack Protection" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <a></a> <h3><span><strong>Introduction</strong></span></h3> <p>Welcome to Cybereason’s Next Generation Anti-Virus Redefined online ebook.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/NGAV-redefined-blog-post-text.png" alt="NGAV Redefined: 9 Layers of Unparalleled Attack Protection" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <a></a> <h3><span><strong>Introduction</strong></span></h3> <p>Welcome to Cybereason’s Next Generation Anti-Virus Redefined online ebook.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fngav-redefined-9-layers-of-unparalleled-attack-protection&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> NGAV Product Blog NGAV Redefined Mon, 14 Nov 2022 15:50:49 GMT https://www.cybereason.com/blog/ngav-redefined-9-layers-of-unparalleled-attack-protection 2022-11-14T15:50:49Z Cybereason Team A Message to All Defenders This Veterans Day https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Veterans%20Day%20Defenders-1.png" alt="Veterans Day Message to All Cybersecurity and National Security Defenders" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I’m Dan Verton, Director of Content Marketing at Cybereason and a proud veteran of the United States Marine Corps. On behalf of my U.S.-based colleagues at Cybereason, I want to extend our sincere gratitude and appreciation to all who have answered our nation’s call to service.&nbsp;</p> <div class="hs-featured-image-wrapper"> <a href="https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day" title="" class="hs-featured-image-link"> <img src="https://www.cybereason.com/hubfs/Veterans%20Day%20Defenders-1.png" alt="Veterans Day Message to All Cybersecurity and National Security Defenders" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"> </a> </div> <p>I’m Dan Verton, Director of Content Marketing at Cybereason and a proud veteran of the United States Marine Corps. On behalf of my U.S.-based colleagues at Cybereason, I want to extend our sincere gratitude and appreciation to all who have answered our nation’s call to service.&nbsp;</p> <img src="https://track.hubspot.com/__ptq.gif?a=3354902&amp;k=14&amp;r=https%3A%2F%2Fwww.cybereason.com%2Fblog%2Fa-message-to-all-defenders-this-veterans-day&amp;bu=https%253A%252F%252Fwww.cybereason.com%252Fblog&amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "> Defender Community Veterans Day Dan Verton Fri, 11 Nov 2022 13:00:00 GMT dan.verton@cybereason.com (Dan Verton) https://www.cybereason.com/blog/a-message-to-all-defenders-this-veterans-day 2022-11-11T13:00:00Z