Five Things You Need to Know About Ransomware Attacks

The digital threat landscape as a whole is constantly changing and evolving. That can make it difficult to keep track of new developments for specific threats like ransomware. Don’t worry though, Cybereason has got you covered.
The post Five Thing… Continue reading Five Things You Need to Know About Ransomware Attacks

MITRE ATT&CK: Cybereason Dominates the Competition

The long-awaited 2020 MITRE ATT&CK evaluations are out! With the MITRE ATT&CK framework now being the standard by which Defenders can measure the effectiveness of various solutions in tracking adversary behavior, cyber vendors are cherry-p… Continue reading MITRE ATT&CK: Cybereason Dominates the Competition

Cybersecurity Lessons from the Pandemic: Protection

To paraphrase an old saying: “One person’s prevention is another person’s protection.” This may well apply to the wearing of masks during the pandemic, the efficacy of which is still being hotly debated by some. Having gone through various iterations, … Continue reading Cybersecurity Lessons from the Pandemic: Protection

Which security measures would be helpful for running executables from a mathematically-safe range? Do I need to take any?

I’m going to be searching within byte range 90,000 – 99,999, explicitly for executables. Each found will be executed on the same system before the next jump. If execution is successful, the file will be retained for further inspection at a… Continue reading Which security measures would be helpful for running executables from a mathematically-safe range? Do I need to take any?

Spike in Snake Ransomware Activity Attributed to New Campaign

Security researchers attributed a spike in Snake ransomware activity to a new campaign that’s targeted organizations worldwide. Snake ransomware first attracted the attention of malware analysts in January 2020 when they observed the crypto-malwa… Continue reading Spike in Snake Ransomware Activity Attributed to New Campaign

Retrieving CSRF token from third party website form using XHR (JavaScript)

I know they say CSRF tokens are the most secure way to prevent CSRF attacks but what if someone uses XHR to retrieve the page containing the csrf token along with the form and then use that token for his attacks?

Why they don’t say “Refer… Continue reading Retrieving CSRF token from third party website form using XHR (JavaScript)

‘Ransomwared’ Ransomware Strain Demands Explicit Pictures as Payment

Security researchers spotted a new ransomware strain called “Ransomwared” demanding explicit pictures from its victims as a means of payment. Upon successful infection, Ransomwared runs its encryption routine, appending the file extensions … Continue reading ‘Ransomwared’ Ransomware Strain Demands Explicit Pictures as Payment