<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Insights Resources

Webinars

On Demand Webinar: How to Build a Closed-Loop, Strategic Security Process with MITRE ATT&CK

Based on our recent white paper, this webinar will go into the five essential stages you should be following to implement a closed-loop, tactical security effort with MITRE ATT&CK. Danielle Wood, Senior Director of Advisory Services at Cybereason, will focus on how to deliver consistent, real improvement in detection capabilities.

Read More
Webinars

Based on our recent white paper, this webinar will go into the five...

Read More
White Papers

The Right Roles for SIEM and EDR

Our white paper explores the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence in a repeatable, reliable way.

Read More
White Papers

Our white paper explores the complementary and interdependent uses ...

Read More
Research

NEW URSNIF VARIANT TARGETS JAPAN PACKED WITH NEW FEATURES

The Cybereason research team observed a new campaign involving Ursnif in the beginning of 2019 attacking users in Japan across multiple customer environments. This Ursnif variant has enhanced stealing modules focused on taking data from mail clients and email credentials stored in browsers.

Read More
Research

The Cybereason research team observed a new campaign involving Urs...

Read More
White Papers

Five Stages to Create a Closed-loop Security Process with MITRE ATT&CK

Our white paper shares five essential stages you should be following to implement a closed-loop, tactical security effort with MITRE ATT&CK. Combining techniques, tactics, and procedures with adversary emulation plans, this white paper gives you background to build an effective, iterative defense.

Read More
White Papers

Our white paper shares five essential stages you should be followin...

Read More
Research

Astaroth Malware Uses Legitimate OS and Antivirus Processes to Steal Passwords and Personal Data

In this research, we explain one of the most recent and unique campaigns involving the Astaroth trojan. This Trojan and information stealer was recognized in Europe and chiefly affected Brazil through the abuse of native OS processes and the exploitation of security-related products.

Read More
Research

In this research, we explain one of the most recent and unique camp...

Read More