Anatomy of an Attack 4 – Top 5 Malware in 2022.

Malware is the weapon of choice of our adversaries - the "arm, deliver and detonate" weapon. According to st...
Read more

Anatomy of Attack # 3 – Malware – Delivery & Exploitation

Malicious software - malware - is undoubtedly the most common tool for "work" of cybercriminals. Thanks to i...
Read more

Cybereason as the overall leader in the KuppingerCole 2022 Leadership Compass for Endpoint Protection, Detection and Response (EPDR) vendors

KuppingerCole Analysts, a leading multinational analytical firm based in Europe, has just selected Cybereaso...
Read more

Why is XDR telemetry something more?

The term "telemetry" refers to data collected by specific devices - in case of our article - devices securin...
Read more

Anatomy of Attack # 2 – Main in the Middle

Man-in-the-middle (MITM) attacks are a common type of cybersecurity attacks that allow attackers to eavesdro...
Read more
Please be advised that our website is using cookies for marketing, statistical and functional reasons. In order to optimize the content on our website and to adapt them to your individual needs, we use informations saved using cookies on users’ end devices. Cookies can be controlled by the user through the settings of their web browser. By contiuning to use our website without changing your web browser settings, you are accepting the use of cookies.
I accept More info