<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=116645602292181&amp;ev=PageView&amp;noscript=1">

Insights Resources

Research

Banking Trojan Delivered By LOLbins: How the Ramnit Trojan spreads via sLoad in a cyberattack

Cybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate this attack, its use of sLoad, and its adoption of LOLbins to minimize discovery.

Read More
Research

Cybereason detected an evasive infection technique used to spread a...

Read More
Webinars

On-Demand Webinar: MITRE ATT&CK Framework with Israel Barak

The MITRE ATT&CK framework is a very effective tool for “adversary emulation,” cataloging how adversaries behave, what they’re trying to do, and the techniques used to accomplish their means. Moreover, the framework aims to provide a common language and vocabulary for practitioners, vendors, and all parties working to understand common threat actors and techniques.

Read More
Webinars

The MITRE ATT&CK framework is a very effective tool for “adversary ...

Read More
Webinars

2019 Security Predictions Webinar

In this webinar, Sam Curry, Chief Security Officer at Cybereason, talks about his predictions and the trends he sees evolving in the cybersecurity space in 2019. From IoT, mobile, and the rise of "Living Off the Land", all the way to politics and critical infrastructure, and the impact it all might have on the cybersphere, Sam speaks at length about the factors that will shape the cybersecurity landscape of tomorrow.

Read More
Webinars

In this webinar, Sam Curry, Chief Security Officer at Cybereason, t...

Read More
Research

Pervasive Brazilian financial malware targets bank customers in Latin America and Europe

Cybereason’s Nocturnus team mapped out the multi-stage malware distribution infrastructure behind Brazilian financial malware and found that Brazilian-made malware have become pervasive and target over 60 banks in nearly a dozen countries throughout Latin America, Spain and Portugal.

Read More
Research

Cybereason’s Nocturnus team mapped out the multi-stage malware dist...

Read More
Webinars

Security Deep Dive: Analyst & CISO Perspectives

In this webinar, Sam Curry, CSO at Cybereason, will moderate a discussion between Cory Collins, Analyst at Mars, and Rich Rushing, CISO at Motorola Mobility. Both Cory and Rich were speakers at DEEP 2018 and will discuss learnings from the conference, struggles they face in their day-to-day jobs, and how they stay current on the ever-changing landscape.

Read More
Webinars

In this webinar, Sam Curry, CSO at Cybereason, will moderate a disc...

Read More
Case Study

Connecticut Water

Connecticut Water provides life-sustaining water to more than 360,000 people in 59 communities in Connecticut and Maine. This critical infrastructure provider needed greater visibility into its 500 endpoints, including the ones in its corporate network and industrial control systems environment.

Read More
Case Study

Connecticut Water provides life-sustaining water to more than 360,0...

Read More
Webinars

Hacking the Vote: How Cyberattacks Can Impact Elections and What Companies Can Learn

Cybereason recently held a tabletop exercise to explore how cyberattacks could be used to interfere with elections. This simulation expressly forbids the hacking of electronic voting machines or voter rolls. Instead, the focus was on methods that are less obvious but equally effective: fake news, traffic jams, threats to the public’s safety and confusion around where and when to vote.

Read More
Webinars

Cybereason recently held a tabletop exercise to explore how cyberat...

Read More