Syndicated Blog

Blog
Get the latest research, expert insights, and security industry news.
Deceptive Signatures: Advanced Techniques in BEC Attacks

Deceptive Signatures: Advanced Techniques in BEC Attacks

KEY TAKEAWAYS Sophistication of BEC Attacks: Business Email Compromise (BEC) attacks are becoming increasingly sophisticated, leveraging advanced social engineering, AI-driven personalization, and phishing kits in order to overcome MFA protections. Exploitation of ...
"Out-of-the-Box" Detection Coverage: A Critical Metric for Endpoint Security

“Out-of-the-Box” Detection Coverage: A Critical Metric for Endpoint Security

Register now: 2024 MITRE ATT&CK Enterprise Evaluation Result Breakdown Webinar. Back in the summer I wrote a blog around capability versus usability, in which I highlighted that typically industry testing focuses on ...
Securing Critical Infrastructure with XDR

Securing Critical Infrastructure with XDR

In January, CISA, the FBI and the NSA released a joint Cybersecurity Advisory (CSA), titled Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure, that provided an overview of Russian ...
UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)

UPDATED: Cybereason Log4Shell Vaccine Offers Permanent Mitigation Option for Log4j Vulnerabilities (CVE-2021-44228 and CVE-2021-45046)

UPDATE 12/17/21: The Logout4Shell Vaccine has been updated to add a persistent option in addition to the existing one which reverted upon server restart. The previous version of the Vaccine used the ...
Cybereason Taps Former Dyson CISO CK Chim as Field CSO to Support APAC Expansion

Cybereason Taps Former Dyson CISO CK Chim as Field CSO to Support APAC Expansion

Cybereason today announced CK Chim, Chim was most recently Dyson’s Chief Information Security Officer (CISO), has joined the company as Field Chief Security Officer for the Asia Pacific region, bringing more than ...
Leveraging the XDR Advantage in the Midst of a Pandemic

Leveraging the XDR Advantage in the Midst of a Pandemic

The pandemic has changed organizations’ technology priorities profoundly over the last two years. In a study reported on by Business Wire, cybersecurity and hybrid working constituted the top enterprise technology priorities looking ...
Ransomware by the Numbers – An Impact Overview

Ransomware by the Numbers – An Impact Overview

The number of global ransomware attacks is on the rise. According to Threatpost, the global volume of ransomware operations reached 304.7 million attacks in H1 2021. That’s a year-over-year increase of 151% ...
Malicious Life Podcast: Tay: A Teenage Bot Gone Rogue

Malicious Life Podcast: Tay: A Teenage Bot Gone Rogue

In March, 2016, Microsoft had something exciting to tell the world: the tech giant unveiled an AI chatbot with the personality of a teenager. Microsoft Tay, as it was nicknamed, could tweet, ...