Blog

Predicting the line between cyberspace and geo-political action

Post by: Sarah Maloney

The cost, actual damage, and number of organizations hit by the NotPetya attack are likely to be concealed by attempts to maintain stock prices and the patchwork of disclosure regulations around...

+ Read More

The six phrases CISOs need to use to bridge the gap between security and business

Post by: Fred O'Connor

CISOs who want to earn the trust of other executives should study the history and evolution of the CIO. When these technology leaders began to appear in organizations they had to align themselves...

+ Read More

Cybereason Intelligence Group examines the growing trend of destructive attacks

Post by: Sarah Maloney

The latest report issued by the Cybereason Intelligence Group (CIG), Owning the Battlefield, examines the increase in the quantity and specificity of destructive cyber attacks, especially those...

+ Read More

Use behavioral analysis to detect a new Ursnif banking Trojan campaign in Japan

Post by: Fred O'Connor

In the past 24 hours, Cybereason Labs has detected a new wave of phishing emails targeting Japanese users. The phishing emails appear to come from Japan’s Post Service. In reality, attackers...

+ Read More

How to avoid getting hacked at Black Hat and Def Con

Post by: Fred O'Connor

Security professionals aren't the only ones heading to Black Hat and Def Con. Attackers are also converging in Las Vegas since both conferences present them with the perfect chance to test their...

+ Read More

AI can change information security but only if users can understand the technology's benefits

Post by: Fred O'Connor

In information security, the bad guys have an advantage over the good guys. But artificial intelligence can help close this asymmetrical gap and provide defenders with the needed edge.

+ Read More

The two-actor theory behind the NotPetya attack

Post by: Cybereason Intelligence Group

In the past two weeks, the Cybereason Intelligence Group has looked at the NotPetya/M.E.Doc attack. In this blog post, we'll share our latest thinking about the two actors vs one actor hypothesis...

+ Read More

Paving the way for the next generation of CISOs

Post by: Sarah Maloney

The role of Chief Information Security Officer (CISO) is not for the gutless. It's a tough job. You must be passionate, know the ins and outs of all the different security technologies as well as...

+ Read More

Three lingering questions around the NotPetya attack

Post by: Cybereason Intelligence Group

Two weeks after the NotPetya attack disrupted organizations across the world, especially those in the Ukraine, researchers agree that the malware propagating by corrupted software updates of an...

+ Read More

Stop that! macOS isn't as secure as you think

Post by: Sarah Maloney

We've all heard someone say it ..."Macs don't get viruses." Most people still seem to think macOS is super secure. Sorry, but this idea hasn't been true for a while now. It is still true though that...

+ Read More