THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware

THREAT ANALYSIS REPORT: From Shatak Emails to the Conti Ransomware

|
The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them.  ... Read More
THREAT ANALYSIS REPORT: Snake Infostealer Malware

THREAT ANALYSIS REPORT: Snake Infostealer Malware

The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ... Read More
Running Robust Managed Detection and Response Services

Running Robust Managed Detection and Response Services

Information security practitioners have published a lot of articles around topics like how to build and run a security operations center (SOC) and specific SOC functions such as incident response and threat hunting. These topics are always important, as threat actors are constantly coming up with more sophisticated attack strategies ... Read More
THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability

THREAT ALERT: Microsoft MSHTML Remote Code Execution Vulnerability

The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ... Read More