1small
29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home users and businesses. The […]

29 Aug 2019 • Yiftach Keshet

A Guide to Rootkit Detection: History, Methods and More

1small

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home users and businesses. The […]

banner2
22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

banner2

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

12s
15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

12s

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

small-blog
24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]

24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

small-blog

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]

square-irPartners_the-hackernewsImage
09 Jul 2019 • Yiftach Keshet

Incident Response at the Speed of Light

As organizations come to the realization that they cannot skimp on security, they are increasingly turning to the services of […]

09 Jul 2019 • Yiftach Keshet

Incident Response at the Speed of Light

square-irPartners_the-hackernewsImage

As organizations come to the realization that they cannot skimp on security, they are increasingly turning to the services of […]

230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)
03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

03 Jul 2019 • Yiftach Keshet

The Definitive Security for Management PPT Template

230-x-150-The-Definitive-Security-for-Management-Presentation-Template-(1)

People, not Technology Cybersecurity is never just about technology. At the end of the day, it’s about the people who […]

blog1
26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

26 Jun 2019 • Rob Black

Four SOC 2 Technical Controls That You Want to Get Right!

blog1

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these are founders or […]

blog-vis
11 Jun 2019 • Yiftach Keshet

Cynet Free Visibility Campaign Provides Full Insight into Internal Network

One of the biggest challenges facing IT security teams is protecting organizational assets, as this entails achieving visibility into all […]

11 Jun 2019 • Yiftach Keshet

Cynet Free Visibility Campaign Provides Full Insight into Internal Network

blog-vis

One of the biggest challenges facing IT security teams is protecting organizational assets, as this entails achieving visibility into all […]

blog2
05 Jun 2019 • Cynet Labs

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences of the Ursnif banking […]

05 Jun 2019 • Cynet Labs

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

blog2

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences of the Ursnif banking […]