On-Demand Webinar: Generating a Hypothesis in a Threat Hunt
In this webinar, Mor Levi, VP of Security Practices at Cybereason, helps you understand how to generate a hypothesis for a threat hunt.
Read MoreFind more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.
Featured
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
Watch NowIn this webinar, Mor Levi, VP of Security Practices at Cybereason, helps you understand how to generate a hypothesis for a threat hunt.
Read MoreRansomware is not a new form of attack, but GandCrab has upgraded it to be more dynamic and harder to resolve.
Read MoreIn this research, we introduce a meticulously planned, malicious operation against a financial institution in April of 2019 by TA505.
Read MoreCompanies know they need to get into the incident response and threat hunting business with a SOC. However, actually accomplishing that with little risk, high efficiency, and confidence can be a difficult task.
Read MoreEarlier this year, our team discovered a new campaign of Ursnif attacking users in Japan across multiple customer environments. In this webinar, Jacob Berry, Principal Incident Response Specialist at Cybereason, analyzes this new variant.
Read MoreBased on our recent white paper, this webinar will go into the five essential stages you should be following to implement a closed-loop, tactical security effort with MITRE ATT&CK. Danielle Wood, Senior Director of Advisory Services at Cybereason, will focus on how to deliver consistent, real improvement in detection capabilities.
Read MoreThe Cybereason team has uncovered a severe threat that adapts Emotet to drop TrickBot, and adapts TrickBot to not only steal data but also download the Ryuk ransomware.
Read MoreOur white paper explores the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence in a repeatable, reliable way.
Read MoreThe Cybereason research team observed a new campaign involving Ursnif in the beginning of 2019 attacking users in Japan across multiple customer environments. This Ursnif variant has enhanced stealing modules focused on taking data from mail clients and email credentials stored in browsers.
Read MoreIn this research, we explain one of the most recent and unique campaigns involving the Astaroth trojan. This Trojan and information stealer was recognized in Europe and chiefly affected Brazil through the abuse of native OS processes and the exploitation of security-related products.
Read More