<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

What Modern Ransomware Looks Like

Ransomware

What Modern Ransomware Looks Like

Over the past year, we have seen many different types of ransomware attacks evolving, especially evolving into multistage ransomware that not only ransoms data, but also exfiltrates as much data as possible. This blog explores three of the most common modern ransomware attacks we are seeing today. 

UbU: Championing Diversity, Equity, and Inclusion at Cybereason

Insights

UbU: Championing Diversity, Equity, and Inclusion at Cybereason

UbU (“you be you”) is the value that sits front and center at Cybereason. Acceptance of every person is at the heart of who we are as a company.

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Ransomware

Cybereason’s Newest Honeypot Shows How Multistage Ransomware Attacks Should Have Critical Infrastructure Providers on High Alert

Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical infrastructure providers.

How I made my company’s office into a fancy internet cafe and why should you too

Cybereason

How I made my company’s office into a fancy internet cafe and why should you too

In this article I describe a security strategy that helped my organization avoid this scenario by simply ignoring the perimeter, making us indifferent to the location our employees are working from.

What are Adversary Emulation Plans?

MITRE ATT&CK Framework

What are Adversary Emulation Plans?

Though AEPs are especially important when testing and building a strong defense, they are often overlooked for TTPs by security practitioners versed in the “trench warfare” of day-to-day security operations.

Why Not Detect Every TTP in the MITRE ATT&CK Framework?

MITRE ATT&CK Framework

Why Not Detect Every TTP in the MITRE ATT&CK Framework?

One could argue that, if you can detect all the TTPs in ATT&CK, you should also be able to defend against all of the adversaries in ATT&CK. While technically true, many TTPs are not inherently malicious. 

IOCs vs. IOBs

Malware

IOCs vs. IOBs

IOCs are valuable when preventing known malware, but over 350,000 new strains of malware are detected every day, and fileless malware attacks are on the rise. IOCs are no longer an innovative or sufficient standalone method for defense. 

What is the MITRE ATT&CK Framework?

MITRE ATT&CK Framework

What is the MITRE ATT&CK Framework?

MITRE’s Adversarial Tactics, Techniques, and Common Knowledge (MITRE ATT&CK) is a model and knowledge base of adversary behavior that has become a staple of the endpoint security space.

Is On-Premise For Endpoint Protection Still A Thing?

Endpoint Protection Platform

Is On-Premise For Endpoint Protection Still A Thing?

At Cybereason, we want to assure our customers and prospects that we support various on-premise deployment options to address their entire endpoint protection security needs.

To Pay or Not to Pay

Ransomware

To Pay or Not to Pay

It might be appealing to have a clear-cut, black-and-white measure for when to talk or when to shut down talks; but the nuances of when it makes sense to enter into negotiations and when it makes sense to pay ransoms for hostages or not is not as straightforward as a five-word policy.