The foundations of threat hunting

Threat hunting is a term often used by vendors and analyst agencies in their publications. One that caught o...
Read more

The further the road… the more XDR

Can we accurately respond to a cyberattack? Can we fully remove the adversary without causing undue business...
Read more

Anatomy of an Attack 4 – Top 5 Malware in 2022.

Malware is the weapon of choice of our adversaries - the "arm, deliver and detonate" weapon. According to st...
Read more

Anatomy of Attack # 3 – Malware – Delivery & Exploitation

Malicious software - malware - is undoubtedly the most common tool for "work" of cybercriminals. Thanks to i...
Read more

Cybereason as the overall leader in the KuppingerCole 2022 Leadership Compass for Endpoint Protection, Detection and Response (EPDR) vendors

KuppingerCole Analysts, a leading multinational analytical firm based in Europe, has just selected Cybereaso...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info