<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

Endpoint Detection and Response

The Timeline to Consolidation of Endpoint Protection Platforms and EDR

The endpoint security market is in the midst of a consolidation of EDR and EPP. How did we get here? Read on to find out.

Explaining Fileless Malware Succinctly with Examples from our Research

Antivirus

Explaining Fileless Malware Succinctly with Examples from our Research

In Q1 2018, fileless attacks were up 94%. Learn about what fileless malware is with common examples from the Cybereason Nocturnus team's research.

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

Advanced Persistent Threat

Operation Soft Cell: A Worldwide Campaign Against Telecommunications Providers

In 2018, the Cybereason Nocturnus team identified an advanced, persistent attack targeting global telecommunications providers.

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

Antivirus

Fauxpersky: CredStealer malware written in AutoHotKey masquerades as Kaspersky Antivirus, spreading through infecting USB drives

Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.

Why antivirus software is becoming the rootkit you pay for

Advanced Persistent Threat

Why antivirus software is becoming the rootkit you pay for

Cybersecurity products have been proven time and again to be a highly effective means to compromise a network. The very nature of the products makes them excellent RATs, usually with the highest access privileges.