
The foundations of threat hunting
Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught o...
Read more

The further the road… the more XDR
Can we accurately respond to a cyberattack? Can we fully remove the adversary without causing undue business...
Read more

Anatomy of an Attack 4 – Top 5 Malware in 2022.
Malware is the weapon of choice of our adversaries - the "arm, deliver and detonate" weapon. According to st...
Read more

Anatomy of Attack # 3 – Malware – Delivery & Exploitation
Malicious software - malware - is undoubtedly the most common tool for "work" of cybercriminals. Thanks to i...
Read more

Cybereason as the overall leader in the KuppingerCole 2022 Leadership Compass for Endpoint Protection, Detection and Response (EPDR) vendors
KuppingerCole Analysts, a leading multinational analytical firm based in Europe, has just selected Cybereaso...
Read more