Endpoint Protection Platform
Zero Trust Race is On: Do You Have the Right Engine?
The shift to a Zero Trust security model has become a top priority for many organizations, driven by record levels of ransomware attacks and a rapidly expanding attack surface stemming from the ...
The CISA Directive Is Crucial for Cybersecurity
As the CEO of a cybersecurity company, it’s important to stay informed--to know about breaking news, emerging threats, and rising trends to provide direction for the company and protection for our customers ...
Actionable XDR Telemetry vs. Uncorrelated SIEM Alerts
As a class of security tools, Security Information and Event Management (SIEM) finds itself in a curious position. On the one hand, the global SIEM market is expected to continue growing over ...
Cybereason and Tech Data Partner to End Cyberattacks in Asia Pacific Region
Cybereason is joining forces with Tech Data, a TD SYNNEX company and a leading global distributor of IT solutions, to protect enterprises across Asia Pacific from sophisticated cyberattacks.  ...
What Are the Most Common Attack Vectors for Ransomware?
There’s been record growth of ransomware attacks in 2021. A recent report documented 304.7 million attack attempts in the first six months of the year, as reported by Threatpost. That’s 100,000 more ...
Webinar November 11th: Live Attack Simulation – Ransomware Threat Hunter Series
Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and ...
THREAT ANALYSIS REPORT: Snake Infostealer Malware
The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ...
THREAT ALERT: Malicious Code Implant in the UAParser.js Library
The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ...
What is XDR? Understanding Extended Detection and Response
XDR, shorthand for the product category of Extended Detection and Response, is a security approach that extends the power of EDR (Endpoint Detection and Response) capabilities to create integrated detection and response ...
Microsoft Publishes Veiled Mea Culpa Disguised as Research
The Microsoft Threat Intelligence Center (MSTIC) shared a report warning that NOBELIUM—the threat actor behind the SolarWinds attacks—is targeting delegated administrative privileges as part of a larger malicious campaign. Microsoft cautions that ...