ANNOUNCEMENT

Resources

Find more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.

On Demand Webinar: How to Build a Closed-Loop, Strategic Security Process with MITRE ATT&CK

Based on our recent white paper, this webinar will go into the five essential stages you should be following to implement a closed-loop, tactical security effort with MITRE ATT&CK. Danielle Wood, Senior Director of Advisory Services at Cybereason, will focus on how to deliver consistent, real improvement in detection capabilities.

Read More

A ONE-TWO PUNCH OF EMOTET, TRICKBOT, & RYUK STEALING & RANSOMING DATA

The Cybereason team has uncovered a severe threat that adapts Emotet to drop TrickBot, and adapts TrickBot to not only steal data but also download the Ryuk ransomware.

Read More

The Right Roles for SIEM and EDR

Our white paper explores the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence in a repeatable, reliable way.

Read More

NEW URSNIF VARIANT TARGETS JAPAN PACKED WITH NEW FEATURES

The Cybereason research team observed a new campaign involving Ursnif in the beginning of 2019 attacking users in Japan across multiple customer environments. This Ursnif variant has enhanced stealing modules focused on taking data from mail clients and email credentials stored in browsers.

Read More

Astaroth Malware Steals Passwords and Personal Data

In this research, we explain one of the most recent and unique campaigns involving the Astaroth trojan. This Trojan and information stealer was recognized in Europe and chiefly affected Brazil through the abuse of native OS processes and the exploitation of security-related products.

Read More

On-Demand Webinar: MITRE ATT&CK Evaluation Results

With the release of our MITRE ATT&CK Evaluation results, Sam Curry, Chief Security Officer, and Israel Barak, Chief Information Security Officer, discuss how Cybereason effectively enables defenders to discover, understand, and respond to a full attack.

Read More

On-Demand Webinar: The Cyber Defense Challenge Journey

In this webinar, Moshe Ishai, Co-Founder of HolistiCyber, addresses the implications of the new cyber era and covers the ways to cope with cyber threats.

Read More

Banking Trojan Delivered By LOLbins: How the Ramnit Trojan spreads via sLoad in a cyberattack

Cybereason detected an evasive infection technique used to spread a variant of the Ramnit banking Trojan as part of an Italian spam campaign. We investigate this attack, its use of sLoad, and its adoption of LOLbins to minimize discovery.

Read More

Pervasive Brazilian financial malware targets bank customers in Latin America and Europe

Cybereason’s Nocturnus team mapped out the multi-stage malware distribution infrastructure behind Brazilian financial malware and found that Brazilian-made malware have become pervasive and target over 60 banks in nearly a dozen countries throughout Latin America, Spain and Portugal.

Read More

Security Deep Dive: Analyst & CISO Perspectives

In this webinar, Sam Curry, CSO at Cybereason, will moderate a discussion between Cory Collins, Analyst at Mars, and Rich Rushing, CISO at Motorola Mobility. Both Cory and Rich were speakers at DEEP 2018 and will discuss learnings from the conference, struggles they face in their day-to-day jobs, and how they stay current on the ever-changing landscape.

Read More