<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor

Research

New Cyber Espionage Campaigns Targeting Palestinians - Part 2: The Discovery of the New, Mysterious Pierogi Backdoor

Cybereason's Nocturnus team has been tracking recent espionage campaigns specifically directed at entities and individuals in the Palestinian territories.

New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign

Research

New Cyber Espionage Campaigns Targeting Palestinians - Part 1: The Spark Campaign

Cybereason's Nocturnus team has been tracking recent espionage campaigns specifically directed at entities and individuals in the Palestinian territories.

The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

Malware

The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware

Cybereason is following an active campaign to deliver seven different types of malware that are able to steal data, mine for cryptocurrency, and deliver ransomware to victims all over the world.

Why is Emotet So Popular and Who is it Targeting Now?

Insights

Why is Emotet So Popular and Who is it Targeting Now?

The malware previously described by DHS as the most destructive ever is surging yet again. Why is Emotet so popular and who is it targeting now?

6 of the Best Malicious Life Cybersecurity History Stories from 2019

Insights

6 of the Best Malicious Life Cybersecurity History Stories from 2019

To close out the year and celebrate seventy episodes of Malicious Life, we’re listing the best cybersecurity podcast episodes we’ve released in 2019.

Is Cyber Retaliation from Iran Imminent?

Insights

Is Cyber Retaliation from Iran Imminent?

We are three days into 2020, and the world is already on high alert. Yesterday evening, the US government killed prominent Maj. Gen. Qasem Soleimani in an overnight airstrike at the Baghdad airport.

Mobile Malware: From Consumer Fraud to Enterprise Espionage

Insights

Mobile Malware: From Consumer Fraud to Enterprise Espionage

The data is telling us that it’s time to secure mobile, and yet our understanding of these threats is severely lacking.

Election Hacking

Guides

Election Hacking

How credible is the threat, and how do we stop it?

How Geopolitical Events Will Change Cybersecurity in 2020

Cybersecurity

How Geopolitical Events Will Change Cybersecurity in 2020

As we enter the New Year, we need to keep in mind how nation state evolution, new targets, and security vendor stagnation will serve as motivation for hackers.

How to Prevent the Next Big POS Breach

Malware

How to Prevent the Next Big POS Breach

A new malware discovered in October called Anchor is being used to target financial, manufacturing, and retail businesses across North America and Europe. The threat actor has been leveraging Anchor and TrickBot together to infect, explore, and exploit high-value targets that implement point of sale systems.