The plan marks the first step in a larger effort to strengthen digital safeguards at municipal water utilities, natural gas pipeline operations and more...
April 14, 2021 / 3 minute read
Israel Barak, Chief Information Security Officer at Cybereason, is a cyber defense and warfare expert with a background developing cyber warfare infrastructure and proprietary technologies, including that of proprietary cryptographic solutions, research and analysis of security vulnerabilities. Israel has spent years training new personnel, providing in-depth expertise related to cyber warfare and security, threat actor’s tactics and procedures. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, research and analysis of advanced threats.
The plan marks the first step in a larger effort to strengthen digital safeguards at municipal water utilities, natural gas pipeline operations and more...
April 14, 2021 / 3 minute read
Earlier this year, Cybereason launched its latest honeypot to analyze the tactics, techniques, and procedures used by state-sponsored groups and cyber crime actors to target critical infrastructure providers.
June 11, 2020 / 6 minute read
Cybereason research clearly shows that companies should not be so quick to dismiss low-level threats. While the common belief is click-fraud malware, adware and similar programs annoy users but pose a relatively minor threat, we’ve seen several non-targeted commodity threats evolve into more dangerous and complex programs.
July 12, 2017 / 3 minute read
Ransomware has become one of the most effective forms of cybercrime. This post explains how ransomware gets in and spreads on machines, the economics behind these operations, and more.
May 31, 2017 / 3 minute read
The rise and commoditization of underground markets offering access to compromised machines introduces a new reality for security professionals.
February 23, 2017 / 3 minute read
You wouldn't board up your home's doors and windows to prevent a break-in. So why would enterprises blacklist processes and tools to prevent attackers from using them to infiltrate their network?
October 13, 2016 / 2 minute read
Protecting the country's infrastructure from advanced attacks is critical to our daily lives, but both candidates skipped this point and talked about flashier information security topics instead.
September 30, 2016 / 2 minute read
Yahoo's Web services may target consumers, but the data breach that affected 500 million of its users could have major ramifications on enterprise security.
September 22, 2016 / 3 minute read
Hackers aren't interested in only intellectual property or financial information. The access your company has to another organization can be just as valuable.
September 20, 2016 / 2 minute read
Your local power company's defenses are no match for the tools nation-state attackers have at their disposal.
August 29, 2016 / 3 minute read
Companies are understandably reluctant to disclose that they've been hacked, but sharing attack details with defenders can benefit the security industry.
August 19, 2016 / 2 minute read
Cybereason's researchers have analyzed customer endpoint data from the past six months to figure out what emerging threats organizations can't ignore.
June 16, 2016 / 1 minute read
Get the latest research, expert insights, and security industry news.
Subscribe