<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

How Geopolitical Events Will Change Cybersecurity in 2020

Cybersecurity

How Geopolitical Events Will Change Cybersecurity in 2020

As we enter the New Year, we need to keep in mind how nation state evolution, new targets, and security vendor stagnation will serve as motivation for hackers.

New Pervasive Worm Exploiting Linux Exim Server Vulnerability

Cybersecurity

New Pervasive Worm Exploiting Linux Exim Server Vulnerability

There’s an active, ongoing campaign exploiting a widespread vulnerability in linux email servers. Read about the attack first here.

Use SIEM and EDR Together to Improve Defenses and Save Money

Cybersecurity

Use SIEM and EDR Together to Improve Defenses and Save Money

Our white paper explores the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence in a repeatable, reliable way.

Why hacking electronic voting machines isn't the only way to impact an election

Cybersecurity

Why hacking electronic voting machines isn't the only way to impact an election

Cybereason held a tabletop exercise to see how attackers could influence elections and how elected officials would protect the vote.

The anatomy of a .NET malware dropper

Cybersecurity

The anatomy of a .NET malware dropper

Attackers don't need sophisticated tools to create effective malware. Basic tools work just fine. Case in point: Cybereason researchers discovered a .NET dropper/crypter. Here's how they reverse engineered it.

Securing Our Democracy: Why Talking Election Meddling During the Trump-Putin Summit is a Detriment to Security

Cybersecurity

Securing Our Democracy: Why Talking Election Meddling During the Trump-Putin Summit is a Detriment to Security

When Trump and Putin discuss cybersecurity at next week's summit, the focus shouldn't be on Russia's meddling with the 2016 presidential election. This would be a wasted opportunity to discuss cyberissues of greater consequence, such as Russian activity against critical infrastructure, writes Ross Rustici, Cybereason's Senior Director for Intelligence Services.

Attackers incriminate a signed Oracle process for DLL hijacking, running Mimikatz

Cybersecurity

Attackers incriminate a signed Oracle process for DLL hijacking, running Mimikatz

With application whitelisting being integrated into an OS’s security stack, attackers need more creative ways to use their tools without getting detected. In this incident observed by Cybereason, DLL hijacking was used to run Mimikatz using a process that was signed and verified by Oracle.

China increases attacks against US companies as trade war looms

Cybersecurity

China increases attacks against US companies as trade war looms

The looming trade war with the U.S. could have prompted China to resume cyberespionage attacks against U.S. companies, violating a 2015 agreement that banned such campaigns. Does this mean that China has abandoned the deal, or will it once again honor the terms if the trade dispute is settled? We talked to Ross Rustici, Cybereason's Senior Director of Intelligence Services, to get his take.

Cybereason CISO Interview Series: Why security leaders need more than technical skills

CISO

Cybereason CISO Interview Series: Why security leaders need more than technical skills

Mario Duarte, vice president of security at Snowflake Computing, learned the importance of aligning security and the business very early in his career. As a 20-something new to security, he thought his keen technical skills would be enough to help him thrive. Then the dotcom bubble burst.

The Most Dangerous Game: North Korea bets the house

Cybersecurity

The Most Dangerous Game: North Korea bets the house

North Korea's decision to drop the withdrawal of U.S. troops from the Korean peninsula as a precondition to denuclearization changes the paradigm around the upcoming talks. This move increases the chances that the U.S. and North Korea will meet but makes no strategic sense from Kim Jong Un's perspective.