ANNOUNCING

Resources

Find more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.

On-Demand Webinar: MITRE ATT&CK Evaluation Results

With the release of our MITRE ATT&CK Evaluation results, Sam Curry, Chief Security Officer, and Israel Barak, Chief Information Security Officer, discuss how Cybereason effectively enables defenders to discover, understand, and respond to a full attack.

Read More

On-Demand Webinar: The Cyber Defense Challenge Journey

In this webinar, Moshe Ishai, Co-Founder of HolistiCyber, addresses the implications of the new cyber era and covers the ways to cope with cyber threats.

Read More

Banking Trojan Delivered By LOLbins: How the Ramnit Trojan spreads via sLoad in a cyberattack

Cybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate this attack, its use of sLoad, and its adoption of LOLbins to minimize discovery.

Read More

Pervasive Brazilian financial malware targets bank customers in Latin America and Europe

Cybereason’s Nocturnus team mapped out the multi-stage malware distribution infrastructure behind Brazilian financial malware and found that Brazilian-made malware have become pervasive and target over 60 banks in nearly a dozen countries throughout Latin America, Spain and Portugal.

Read More

Security Deep Dive: Analyst & CISO Perspectives

In this webinar, Sam Curry, CSO at Cybereason, will moderate a discussion between Cory Collins, Analyst at Mars, and Rich Rushing, CISO at Motorola Mobility. Both Cory and Rich were speakers at DEEP 2018 and will discuss learnings from the conference, struggles they face in their day-to-day jobs, and how they stay current on the ever-changing landscape.

Read More

NEW BETABOT CAMPAIGN UNDER THE MICROSCOPE

The Cybereason SOC has detected multiple Betabot infections in customer environments. In this blog, Cybereason researchers study Betabot’s infection chain and self-defense mechanisms using data gathered from customer environments.

Read More

VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE

Cybereason's Nocturnus Research team analyzes campaigns targeting the Brazilian financial sector, focusing on infection vectors and the threat actor's toolset and techniques.

Read More

WANNAMINE CRYPTOMINER THAT USES ETERNALBLUE STILL ACTIVE

The Wannamine cryptominer, which uses the EternalBlue exploits, is still active although a patch that fixes these well-known vulnerabilities was released last March. Amit Serper, Cybereason's head of security research, examines this variant and makes the case for patching your systems.

Read More

The anatomy of a .NET malware dropper

Attackers don't need sophisticated tools to create effective malware. Basic tools work just fine. Case in point: Cybereason researchers discovered a .NET dropper/crypter. Here's how they reverse engineered it.

Read More

AI Hunting in Action

In this webinar Shlomi Avivi, VP of Information Security at Cybereason will show you how AI hunting is probably the best approach to deal with attacks that use advanced tools and techniques.

Read More