Webinar: The Current State and Future Challenges of Security

Join Ed Amoroso, CEO of TAG Cyber and Sam Curry, CSO of Cybereason as they discuss pre-COVID-19 trends, discontinuities, and the outlook based on recent events and challenges in the security industry. Supply Chain weaknesses, Ransomware, the “new … Continue reading Webinar: The Current State and Future Challenges of Security

Five Things You Need to Know About Ransomware Attacks

The digital threat landscape as a whole is constantly changing and evolving. That can make it difficult to keep track of new developments for specific threats like ransomware. Don’t worry though, Cybereason has got you covered.
The post Five Thing… Continue reading Five Things You Need to Know About Ransomware Attacks

MITRE ATT&CK: Cybereason Dominates the Competition

The long-awaited 2020 MITRE ATT&CK evaluations are out! With the MITRE ATT&CK framework now being the standard by which Defenders can measure the effectiveness of various solutions in tracking adversary behavior, cyber vendors are cherry-p… Continue reading MITRE ATT&CK: Cybereason Dominates the Competition

Inside Effective EDR Evaluation Testing

Periodically, I receive requests from customers asking for explanations on why this particular technique or that one doesn’t generate a Malop™ in the Cybereason Defense Platform. Such questions illustrate that there is still a great deal of educat… Continue reading Inside Effective EDR Evaluation Testing

Ransomware Decoded: Preventing Modern Ransomware Attacks

Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming in with a big splash and causing … Continue reading Ransomware Decoded: Preventing Modern Ransomware Attacks

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim’s machine before launching its encryption routine.
The post Rise of Double-Extortion Shines Spotlight on R… Continue reading Rise of Double-Extortion Shines Spotlight on Ransomware Prevention

The Cybereason Difference: Introduction to the Malop

Welcome to the April edition of our series The Cybereason Difference (inaugural post here). Each post of this series explores a unique way that Cybereason empowers defenders.
The post The Cybereason Difference: Introduction to the Malop appeared f… Continue reading The Cybereason Difference: Introduction to the Malop

Ransomware Defense: Three Implementations Every Security Team Needs

Few will be shocked to hear that ransomware attacks are continuing to accelerate at a torrid pace – but the more concerning trend is the effectiveness of ransomware at creating chaos and paralyzing business operations.
The post Ransomware Defense:… Continue reading Ransomware Defense: Three Implementations Every Security Team Needs

FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher

Cybercrime cost the American public over $4 billion in reported losses over the course of 2020, according to the FBI. In its Internet Crime Report 2020, the FBI’s Internet Crime Complaint Center (IC3) revealed that it had received 791,790 complain… Continue reading FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher

DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know

The widespread HAFNIUM attacks were just the beginning of the problems stemming from multiple vulnerabilities in Microsoft’s Exchange offering that were recently disclosed. According to Bleeping Computer, users began submitting new ransomware atta… Continue reading DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know