NEW LATERAL MOVEMENT TECHNIQUES ABUSE DCOM TECHNOLOGY
Cybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.
Read MoreFind more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.
Featured
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
Watch NowCybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.
Read MoreCompromised Web application servers have been a security issue since the dawn of the Internet but many security solutions don't detect this threat.
Read MoreCybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome. Using familiar icons is meant to deceive users into thinking that the file is legit and safe to open.
Read MoreCybereason's security team on Thursday discovered that the memcached servers used in the largest DDoS attack to date are including a ransom note in the payload.
Read MoreNo one likes grunt work, including attackers, who have turned to bots to automatically handle menial tasks like exploiting vulnerabilities.
Read MoreCybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.
Read MoreMany of the CISOs we meet are debating what approach to take for detecting advanced persistent threats within their network.
Read MoreCybereason researcher Amit Serper has developed a vaccine to prevent the Bad Rabbit data-encrypting malware from infecting machines.
Read More