The Impact of XDR on the Modern SOC
Extended detection and response (XDR) may be the future for security incident detection, investigation, and response, but is XDR making an impact in the SOC today?
Read MoreFind more information about solutions and services, our technology and research insights, webinars and other resources on a wide array of subject matter.
Featured
See the many opportunities an attacker has to advance the operation, and the ways a defender can break the kill chain and end the attack before crown jewels are compromised.
Watch NowExtended detection and response (XDR) may be the future for security incident detection, investigation, and response, but is XDR making an impact in the SOC today?
Read MoreThe Cybereason Nocturnus Team has identified an active espionage campaign attributed to the threat actor known as Molerats that employs three previously unidentified malware variants.
Read MoreDefending against cyber threats requires more than just technology; it demands a skilled and vigilant team. Our Analyst Tabletop Exercise delivers a holistic approach to assessing and enhancing your security professionals' readiness.
Read MoreThe Cybereason Nocturnus Team has been tracking threat actors leveraging the previously undetected Chaes malware to primarily target Brazilian customers of the largest e-commerce company in Latin America, MercadoLivre.
Read MoreJoin us for an hour-long panel on the intricacies of XDR and how it will affect the security industry. Learn what XDR is, specific use cases, and how security practitioners can easily integrate this new technology into their security stack.
WATCH NOWKimsuky has been observed targeting a wide array of victims including public and private sector companies in the U.S., Europe, Japan, South Korea, & Russia.
Read MoreOur Analyst Tabletop Exercise delivers a holistic approach to assessing and enhancing your security professionals' readiness.
Read MoreIn this live panel, we'll explore how the EU Court of Justice recently striking down the EU-US Privacy Shield agreement affects vendors in the security space and answer your questions about the ruling.
WATCH NOWSince April 2020, the Cybereason Nocturnus Team has been investigating the emergence of the Bazar malware, a loader and backdoor used to collect data about the infected machine and to deploy additional malware.
Read MoreIn recent weeks, new activity by the Evilnum group includes a change in the chain of infection and persistence, new infrastructure that is expanding over time, and the use of a new Python-scripted Remote Access Trojan (RAT).
Read More