On-Demand Webinar

Resources

Find more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.

LEVERAGING EXCEL DDE FOR LATERAL MOVEMENT VIA DCOM

DDE, or Dynamic Data Exchange, is a legacy interprocess communication mechanism that’s been part of some Windows applications since as early as 1987. DDE enables applications to request items made available by other programs, such as cells in a Microsoft Excel spreadsheet, and be notified of any changes within these items.

Read More

OSX.PIRRIT MAC ADWARE PART III: THE DAVINCI CODE

OSX.Pirrit’s code had the potential to carry out much more malicious activities. As a result of the report, some of Pirrit’s servers and a few distribution websites were taken down. But the story doesn’t end there.

Read More

NEW LATERAL MOVEMENT TECHNIQUES ABUSE DCOM TECHNOLOGY

Cybereason researchers discovered new lateral movement methods that abuse the DCOM functionality of Windows applications.

Read More

THE CHALLENGES OF DETECTING COMPROMISED PUBLIC WEB SERVERS

Compromised Web application servers have been a security issue since the dawn of the Internet but many security solutions don't detect this threat.

Read More

ATTACKERS TURN TO MASQUERADING ICONS TO BOOST PHISHING ATTACK’S SUCCESS

Cybereason has observed thousands of malicious file executions masquerading as a popular programs such as Adobe PDF Reader, MS Word and Chrome. Using familiar icons is meant to deceive users into thinking that the file is legit and safe to open.

Read More

ATTACKERS INCLUDE RANSOM NOTE IN AMPLIFIED DDOS ATTACKS THAT USE MEMCACHED SERVERS

Cybereason's security team on Thursday discovered that the memcached servers used in the largest DDoS attack to date are including a ransom note in the payload.

Read More

ATTACKERS USE BOTNETS TO BREAK INTO NETWORKS FASTER

No one likes grunt work, including attackers, who have turned to bots to automatically handle menial tasks like exploiting vulnerabilities.

Read More

FAUXPERSKY: CREDSTEALER MALWARE MASQUERADES AS KASPERSKY ANTIVIRUS

Cybereason researchers discovered a credstealer written with AutoHotKey that masquerades as Kaspersky Antivirus and spreads through infected USB drives. We’ve named it Fauxpersky.

Read More

Hospital revenue cycle management company

A hospital revenue cycle management company’s perimeter defense tools weren’t providing it with enough endpoint visibility. The company used Cybereason to gain total visibility and make its junior security analysts more efficient and effective.

Read More

McBee Associates

Cybereason’s EDR platform helps McBee Associates' security team take an offensive, proactive approach to security and immediately detect and stop malicious endpoint activity.

Read More