blog-384-207
07 Nov 2019 • Yiftach Keshet

Exploit Kits: Their Evolution, Trends and Impact

What Are Exploit Kits? Exploit kits are a type of all-inclusive, automated, and rapidly deployable threat. These threats often target […]

07 Nov 2019 • Yiftach Keshet

Exploit Kits: Their Evolution, Trends and Impact

blog-384-207

What Are Exploit Kits? Exploit kits are a type of all-inclusive, automated, and rapidly deployable threat. These threats often target […]

331
24 Oct 2019 • Yiftach Keshet

The 7 Best Free and Open-Source Incident Response Tools

What Is Incident Response? Being prepared is key to responding to security incidents in an accurate and level-headed manner. When […]

24 Oct 2019 • Yiftach Keshet

The 7 Best Free and Open-Source Incident Response Tools

331

What Is Incident Response? Being prepared is key to responding to security incidents in an accurate and level-headed manner. When […]

33
03 Oct 2019 • Yiftach Keshet

6 Incident Response Steps for Effective Security Event Mitigation

Like any other emergency situation, security incidents require swift, coordinated action. But operating in a systematic manner when your company’s […]

03 Oct 2019 • Yiftach Keshet

6 Incident Response Steps for Effective Security Event Mitigation

33

Like any other emergency situation, security incidents require swift, coordinated action. But operating in a systematic manner when your company’s […]

22-(1)
25 Sep 2019 • Yiftach Keshet

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malware researchers Christopher Campbell […]

25 Sep 2019 • Yiftach Keshet

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

22-(1)

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malware researchers Christopher Campbell […]

2
15 Sep 2019 • Yiftach Keshet

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

Back in the early days of malware, scammers spread their wares around from user to user via infected floppy disks. […]

15 Sep 2019 • Yiftach Keshet

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

2

Back in the early days of malware, scammers spread their wares around from user to user via infected floppy disks. […]

1small
29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home users and businesses. The […]

29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

1small

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home users and businesses. The […]

banner2
22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

banner2

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

12s
15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

12s

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

small-blog
24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]

24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

small-blog

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]