Zero Trust Race is On: Do You Have the Right Engine?

Zero Trust Race is On: Do You Have the Right Engine?

The shift to a Zero Trust security model has become a top priority for many organizations, driven by record levels of ransomware attacks and a rapidly expanding attack surface stemming from the ...
The CISA Directive Is Crucial for Cybersecurity

The CISA Directive Is Crucial for Cybersecurity

As the CEO of a cybersecurity company, it’s important to stay informed--to know about breaking news, emerging threats, and rising trends to provide direction for the company and protection for our customers ...
Cybereason and Tech Data Partner to End Cyberattacks in Asia Pacific Region

Cybereason and Tech Data Partner to End Cyberattacks in Asia Pacific Region

Cybereason is joining forces with Tech Data, a TD SYNNEX company and a leading global distributor of IT solutions, to protect enterprises across Asia Pacific from sophisticated cyberattacks.   ...
THREAT ANALYSIS REPORT: Snake Infostealer Malware

THREAT ANALYSIS REPORT: Snake Infostealer Malware

The Cybereason Global Security Operations Center (GSOC) issues Cybereason Threat Analysis reports to inform on impacting threats. The Threat Analysis reports investigate these threats and provide practical recommendations for protecting against them ...
THREAT ALERT: Malicious Code Implant in the UAParser.js Library

THREAT ALERT: Malicious Code Implant in the UAParser.js Library

The Cybereason Global Security Operations Center (SOC) issues Cybereason Threat Alerts to inform customers of emerging impacting threats. The Alerts summarize these threats and provide practical recommendations for protecting against them ...
What is XDR? Understanding Extended Detection and Response

What is XDR? Understanding Extended Detection and Response

XDR, shorthand for the product category of Extended Detection and Response, is a security approach that extends the power of EDR (Endpoint Detection and Response) capabilities to create integrated detection and response ...
Microsoft Publishes Veiled Mea Culpa Disguised as Research

Microsoft Publishes Veiled Mea Culpa Disguised as Research

The Microsoft Threat Intelligence Center (MSTIC) shared a report warning that NOBELIUM—the threat actor behind the SolarWinds attacks—is targeting delegated administrative privileges as part of a larger malicious campaign. Microsoft cautions that ...

Secure Guardrails