Anatomy of an Attack 4 – Top 5 Malware in 2022.
Malware is the weapon of choice of our adversaries - the "arm, deliver and detonate" weapon. According to st...Read more
Anatomy of Attack # 3 – Malware – Delivery & Exploitation
Malicious software - malware - is undoubtedly the most common tool for "work" of cybercriminals. Thanks to i...Read more
Cybereason as the overall leader in the KuppingerCole 2022 Leadership Compass for Endpoint Protection, Detection and Response (EPDR) vendors
KuppingerCole Analysts, a leading multinational analytical firm based in Europe, has just selected Cybereaso...Read more
Why is XDR telemetry something more?
The term "telemetry" refers to data collected by specific devices - in case of our article - devices securin...Read more
Anatomy of Attack # 2 – Main in the Middle
Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdro...Read more