Blog

Cybereason protects against malware utilizing the exploit CVE-2017-8759

Post by: Sarah Maloney

There’s been some buzz going on about the high-to-critical vulnerability CVE-2017-8759. Recorded Future is ranking it with a risk score of 99 out of 100. It’s a pretty big deal, so one of our...

+ Read More

Cybereason CISO Interview Series: You can’t do security in a bubble

Post by: Fred O'Connor

Some security leaders intentionally keep a low profile and would rather operate behind the scenes. Sue Bergamo, who balances the roles of CISO and CIO at digital commerce, content management and...

+ Read More

A few thoughts on the Equifax hack

Post by: Eliad Kimhy
+ Read More

Eight steps to take when conducting your first hunt

Post by: Sarah Maloney

Unlike traditional, reactive approaches to detection, hunting is proactive. With hunting, security professionals don’t wait to take action until they’ve received a security alert or, even worse,...

+ Read More

NotPetya's fiscal impact: $592.5 million and growing

Post by: Fred O'Connor

We all heard how the NotPetya attack paralyzed Ukrainian companies and spread around the world to cripple shipping ports, factories and offices. Now we’re hearing how the malware is taking a toll...

+ Read More

CISO Tips: Balancing the hero with the storyteller

Post by: Fred O'Connor

CISOs are expected to wear a hero’s cape and stop attacks, develop secure products and protect customer and corporate data. But that’s not their only role. Security executives are also at an...

+ Read More

Bitcoin exchanges in South Korea hacked and North Korea is the prime suspect

Post by: Cybereason Intelligence Group

Reports have surfaced that Bitcoin exchanges in South Korea were recently hit by hackers possibly from the Democratic People’s Republic of Korea (DPRK), according to South Korea’s Cyber Warfare...

+ Read More

Threat hunting 101: You asked, we answered

Post by: Sarah Maloney

With many vendors offering an array of threat hunting services, security professionals may wonder if hunting can actually benefit a company or if it’s just a fad. But threat hunting isn’t based on...

+ Read More

Malicious Life, episode 6- Hell to Pay, episode recap

Post by: Eliad Kimhy

In the previous episode of Malicious Life, we discussed the roots of the ransomware phenomena (malicious software that prevents the user from accessing the files on their computer, and demands...

+ Read More

CISO Tips: Learning and using the language of business

Post by: Fred O'Connor

“A cost center that doesn’t align with the rest of the organization. Is run by people who don’t understand the business objectives. The part of organization that fails to deliver return on ...

+ Read More