Endpoint Protection Platform

Ransomware Decoded: Preventing Modern Ransomware Attacks
Cybereason Security Team | | Cybereason, Cybereason XDR Platform, Cybersecurity, EDR, endpoint detection and response, Endpoint Protection Platform, Infosec, mdr, Next Generation Antivirus, Ransomware, ResourcesCat, security, White Paper, XDR
Many types of malware silently persist on the network, move laterally, communicate with their C2, or obfuscate their behaviors to prevent detection. In contrast to this, traditional ransomware was all about coming ...

Rise of Double-Extortion Shines Spotlight on Ransomware Prevention
JJ Cranford | | Cybersecurity, EDR, endpoint detection and response, Endpoint Protection Platform, Extended Detection and Response, Infosec, Malware, Next Generation Antivirus, Ransomware, secops, security, Threat Intelligence, XDR
Double extortion is a tactic employed by some ransomware gangs. It begins when a crypto-malware strain steals information stored on a victim’s machine before launching its encryption routine ...

The Cybereason Difference: Introduction to the Malop
Justin Buchanan | | Cybereason XDR Platform, EDR, endpoint detection and response, Endpoint Protection Platform, Malop, Next Generation Antivirus, Operation-Centric Security, VideosCat, XDR
Welcome to the April edition of our series The Cybereason Difference (inaugural post here). Each post of this series explores a unique way that Cybereason empowers defenders ...
Ransomware Defense: Three Implementations Every Security Team Needs
Few will be shocked to hear that ransomware attacks are continuing to accelerate at a torrid pace - but the more concerning trend is the effectiveness of ransomware at creating chaos and ...
FBI Pegs 2020 Cybercrime Costs at $4 Billion – Actual Losses Likely Higher
Cybercrime cost the American public over $4 billion in reported losses over the course of 2020, according to the FBI. In its Internet Crime Report 2020, the FBI’s Internet Crime Complaint Center ...
DearCry Ransomware and the HAFNIUM Attacks – What You Need to Know
The widespread HAFNIUM attacks were just the beginning of the problems stemming from multiple vulnerabilities in Microsoft’s Exchange offering that were recently disclosed. According to Bleeping Computer, users began submitting new ransomware ...
Why Healthcare Security Requires an Operation-Centric Approach
The healthcare industry is getting much more attention than normal right now. COVID-19 has disrupted business operations and turned lives upside down around the world as everyone struggles to get the pandemic ...
Sodinokibi/REvil Ransomware Gang Hit Acer with $50M Ransom Demand
Cybereason Security Team | | behavioral analytics, Endpoint Protection Platform, Malware, Ransomware
The Sodinokibi/REvil ransomware gang has reportedly infected Taiwanese multinational electronics corporation Acer and demanded a ransom of $50 million. Those responsible for the Sodinokibi ransomware strain announced on their data leaks website ...
SolarWinds Attacks Recovery Effort Could Take U.S. Government 18 Months
The U.S. government could take up to 18 months in its efforts to recover from the SolarWinds supply chain attack, explained the U.S. Cybersecurity & Infrastructure Security Agency (CISA) ...
The Security Value of Exploit Protection
An exploit attack occurs when a malicious actor takes advantage of a software vulnerability to penetrate and then damage or steal information from a computer system. One feature that Cybereason provides to ...