Cybereason

Three signs your SOC is ready for XDR
Over the past year, there’s been a movement growing in the industry towards Extended Detection and Response, or XDR. While a few offerings represent broad portfolio …

Hackers are getting hacked via trojanized hacking tools
Someone has been trojanizing a wide variety of hacking tools to compromise the machines of hackers who want to use the tools for free, Cybereason researcher Amit Serper has …

Linux servers under attack via latest Exim flaw
It didn’t take long for attackers to start exploiting the recently revealed Exim vulnerability (CVE-2019-10149). Active campaigns One security enthusiast detected …

Trust nothing: A life in infosec is a life of suspicion
Like many before him, Amit Serper started his cybersecurity career in one of Israel’s intelligence agencies. Nine years later, he left for the private sector: he joined …
Trustwave partners with Cybereason to strengthen MDR for Endpoints
Trustwave announced a strategic alliance with Cybereason to further strengthen Trustwave Managed Detection and Response (MDR) for Endpoints, a comprehensive managed security …

Cut the FUD: Why Fear, Uncertainty and Doubt is harming the security industry
Although the acronym is close to a century old, FUD (Fear, Uncertainty and Doubt) has come to be closely associated with the technology industry since the 1970s. FUD is a …

Industry reactions to the Deloitte cyber attack
Deloitte has been targeted in an attack that compromised the emails and plans of some of its clients. Here are some of the industry comments Help Net Security received …

AI will change the face of security, but is it still the stuff of sci-fi?
The technology industry has always had a big problem with hype, with marketing teams, analysts and the media alike tending to fixate on the next big thing that will …

Catch emerging strains of ransomware with RansomFree
In this podcast recorded at RSA Conference 2017, Yoel Eilat, Senior Product Manager at Cybereason, talks about RansomFree – the free, anti-ransomware protection …

Rewriting the rules on how to protect against evolving adversaries
Hackers are getting better at exploiting your organization’s increasingly complex IT environment. Adversaries are using highly customized attack campaigns to infiltrate …

Photos: RSA Conference 2017 Expo, part 1
RSA Conference 2017 is underway at the Moscone Center in San Francisco. Here are a few photos from the Expo floor. Featured companies: Qualys, ThreatQuotient, iovation, …

Cybereason unveils complete next-generation endpoint platform
Cybereason unveiled a new Endpoint Security Platform that includes next-generation antivirus (NGAV) functionality at RSA Conference 2017 in San Francisco. By integrating …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility