iob

Under the Hood: What Artificial Intelligence on the Endpoint Looks Like
Karishma Asthana | | AI, Artificial Intelligence, Cybereason Predictive Ransomware Protection, Cybereason XDR Platform, Cybereason XDR powered by Chronicle, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, EPP, Extended Detection and Response, Indicators of Behavior, Infosec, iob, Next Generation Antivirus, ngav, Prediction Algorithm, RansomOps, Ransomware, Ransomware Attackers Don’t Take Holidays, security, Unified Endpoint Security, XDR
In light of a recent Cybereason research report, Organizations at Risk: Ransomware Attackers Don’t Take Holidays, regarding the prevalence of ransomware attacks that occur during off-hours, it’s imperative that we look towards ...

The Ransom Disclosure Act and Defending Against Complex RansomOps
Cybereason Security Team | | Cybereason XDR Platform, Cybereason XDR powered by Chronicle, Cybersecurity, EDR, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, EPP, Extended Detection and Response, Indicators of Behavior, indicators of compromise, Infosec, iob, Network Security, RansomOps, Ransomware, security, Unified Endpoint Security, XDR
On October 5, U.S. Senator Elizabeth Warren (D-Mass.) introduced the Ransom Disclosure Act. She framed it as something that could help the U.S. government learn more about how ransomware operations work ...

If You Prevent Ransomware You Don’t Need to Recover from It
Lior Div | | Anti-Ransomware, behavioral analytics, Cybereason Anti-Ransomware Solution, Cybersecurity, EDR, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, enterprise security, EPP, Extended Detection and Response, Indicators of Behavior, iob, Lior Blog, Lior Div, Malop, Network Security, Next Generation Antivirus, RansomOps, Ransomware, Unified Endpoint Security, XDR
I started Cybereason to help defenders protect their networks and data against attacks—to use what I know about how cybercriminals think and how adversaries work to give defenders an advantage against all ...

How the Ransomware Gangs Stay One Step Ahead
Cybereason Security Team | | Anti-Ransomware, cybercrime, Cybersecurity, Egregor, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, enterprise security, Extended Detection and Response, Indicators of Behavior, Infosec, iob, LockBit2.0, Malware, Maze, Network Security, Next Generation Antivirus, ngav, RansomOps, Ransomware, security, Unified Endpoint Security, XDR
Ransomware attacks increased dramatically in the first half of 2021. As reported by ITProPortal, the volume of global ransomware hit 304.7 million during that six-month period. That’s 0.1 million more ransomware attacks ...

Four Considerations for Evaluating XDR Platforms
Cybereason Security Team | | cyberattack, Cybersecurity, EDR, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, enterprise security, Extended Detection and Response, Indicators of Behavior, Infosec, iob, managed detection and response, mdr, Network Security, risk management, security, Unified Endpoint Security, XDR
There’s a growing need for the more holistic approach to threat detection and response that XDR can deliver. Why? Just look at what’s going on in the digital threat landscape ...

What is Driving the Surge of Ransomware Attacks?
Cybereason Security Team | | Advanced persistent threat, Anti-Ransomware, antivirus, APT, Colonial Pipeline, cryptocurrency, cybercrime, Cybereason Anti-Ransomware Solution, Darkside, EDR, Endpoint Controls, endpoint detection and response, Endpoint Protection Platform, EPP, Indicators of Behavior, Infosec, iob, Kaseya Attacks, Next Generation Antivirus, RansomOps, Ransomware, rEvil, security, StopRansomware.gov, Unified Endpoint Security
Some major ransomware attacks have dominated the headlines recently. Back in the beginning of May, for instance, the Colonial Pipeline Company suspended its daily transportation of 100 million gallons of fuel between ...

SolarWinds Threat Actors Behind New Email Attack Campaign
Sam Curry | | Advanced persistent threat, APT, Cobalt Strike Beacon, Constant Contact, Cybersecurity, endpoint detection and response, Endpoint Protection Platform, Espionage, Indicators of Behavior, Infosec, iob, Malware, security, SolarWinds Attacks, TTP, Unified Endpoint Security, USAID
The threat actors behind last year’s SolarWinds supply chain attack have launched a new email attack campaign aimed at organizations around the world. This attack wave attracted the attention of the Microsoft ...

The Cybereason Advantage: Why Cybereason Was Named A Visionary in the 2021 Gartner Magic Quadrant for EPP
Meg O'Leary | | Cybereason Defense Platform, Cybersecurity, endpoint detection and response, Endpoint Protection Platform, EPP, Extended Detection and Response, Gartner, Gartner EPP MQ, Gartner Magic Quadrant, Indicators of Behavior, Infosec, iob, Malop, prevention, security, Unified Endpoint Security, XDR
The Cybereason team is excited to announce that Gartner has named Cybereason a Visionary in the 2021 Gartner Magic Quadrant for Endpoint Protection Platforms. This is Cybereason’s first recognition in this influential ...

Three Keys to a Reliable Ransomware Defense Strategy
Cybereason Security Team | | Cybereason XDR Platform, Cybersecurity, Double Extortion, EDR, endpoint detection and response, Endpoint Protection Platform, EPP, Indicators of Behavior, Infosec, iob, ngav, Ransomware, security, security awareness training, Unified Endpoint Security, XDR
As we noted in a previous blog post, ransomware attacks are becoming more frequent and more costly. Reports reveal that there were 304 million ransomware attacks in 2020 - 62% more than ...

Securing the Financial Sector Now and Into the Future with XDR
Eric Sun | | Cybersecurity, EPP, Extended Detection and Response, Financial Services, Indicators of Behavior, indicators of compromise, Infosec, iob, IOC, Unified Endpoint Security, XDR
Figuring out if your organization is under attack is typically a time-consuming, labor-intensive affair. Analysts must gather data across multiple security tools and perform careful analysis, a process that can take hours, ...