Cybereason
Cybereason
Blog Post
  • In April 2016, I published a research report that analyzed a very nasty piece of adware that targets Mac OS X. Called OSX.Pirrit, I discovered that it wasn’t your typical adware program that just floods a person’s browser with ads. With components such as persistence and the ability to obtain root access, OSX.Pirrit has characteristics usually seen in malware. While OSX.Pirrit’s main goal was t...

Cybereason
Cybereason
Blog Post
  • Unlike attacks carried out by traditional malware, fileless malware operations don’t require the attackers to install a single piece of software on a target’s machine. Instead, fileless malware attacks entail taking tools built into Windows, particularly PowerShell, and using them for malicious activity. Using legitimate programs makes detecting these attacks particularly challenging s...

Cybereason
Cybereason
Blog Post
  • So, what does 2018 hold in store for the defenders? Cybereason’s researchers and analysts identified the following as some of the bigger security trends in the new year:

Cybereason
Cybereason
Blog Post
  • According to Bloomberg, about a year ago hackers stole the personal data of 57 million Uber customers and drivers. After finding out about this breach, Uber leaders not only decided against disclosing it to employees, customers and state and federal regulators but also paid $100,000 to the attackers to keep it a secret. 

Cybereason
Cybereason
Blog Post
  • For several years, protecting endpoints meant using antivirus software. These programs, which are commonly referred to as AV, are designed to detect malicious programs, prevent them from executing and provide security analysts with a way to remove malware. Antivirus was designed as a mouse trap to identify malware based on signatures. Signatures are a unique string of bits, or the bina...

Cybereason
Cybereason
Blog Post
  • If security wasn't already a board-level topic of discussion, destructive attacks like NotPetya and WannaCry and the threat of ransomware have undoubtedly made it one. Cybersecurity has crept its way into earnings calls. Listening to CEOs and CFOs explain to investors how malware like NotPetya cost organizations millions in quarterly revenue is becoming as common as hearing about earni...

Cybereason
Cybereason
Blog Post
  • The biggest concern for CISOs isn’t necessarily a nation-state attack or a user unknowingly clicking on a link in a phishing email or protecting their company from a new, nasty piece of malware. Instead, the biggest challenge for security leader is figuring out how to get the security department’s priorities aligned with the business' priorities.

Cybereason
Cybereason
Blog Post
  • During a call on Tuesday to discuss its third-quarter earnings, AP Moller-Maersk executives brought up topics typically associated with operating Maersk Line, the world’s largest largest container shipping line. CEO Soren Skou talked about the growing demand for container shipping while CFO Jakob Stausholm mentioned Maersk’s major capital expenditures for the quarter: the receiving of ...

Cybereason
Cybereason
Blog Post
  • DDE, or Dynamic Data Exchange, is a legacy interprocess communication mechanism that’s been part of some Windows applications since as early as 1987. DDE enables applications to request items made available by other programs, such as cells in a Microsoft Excel spreadsheet, and be notified of any changes within these items.

Cybereason
Cybereason
Blog Post
  • For several months Cybereason has been following the concerning rise of ONI, a family of ransomware involved in targeted attacks against Japanese companies. We suspect that the ONI ransomware was used as a wiper to cover up an elaborate hacking operation. These targeted attacks lasted between three to nine months and all ended with an attempt to encrypt hundreds of machines at once. Fo...

Cybereason
Cybereason
Blog Post
  • The intentional misdirection of shipping vessels in the Black Sea, the jamming of GPS along South Korea, and the multiple collisions of the United States Seventh Fleet are almost certainly unrelated, but these events do begin to illustrate the possibility of a link. We’re seeing a worrisome trend emerge lately, the public demonstration and discussion of the benefits of affecting sea ve...

Cybereason
Cybereason
Blog Post
  • What an incredible couple of days at DEEP 2017! Thank you to all our special guests, speakers, customers, and friends for truly making Cybereason's first security conference an unforgettable event. DEEP 2017 included keynotes, unique perspectives and remarkable stories from security industry leaders and beyond. We’ve done our best to recap the highlights and the energy from the show, i...

Cybereason
Cybereason
Blog Post
Cybereason
Cybereason
Blog Post
  • Dealing with the challenges posed by the public disclosure of offensive cyber capabilities has become common for security professionals. More recent disclosures include the ongoing Vault 7 leaks that started in March 2017 and released details on the CIA’s supposed cyber warfare and electronic surveillance secrets, and The Shadow Brokers’ April leak that introduced, among other tools an...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.