28 Aug 2018 • Daniel Bressler

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse

By: Daniel Bresler, CyOps Team Leader .NET binary abuse is not overly sophisticated, nor is it a new method of […]

28 Aug 2018 • Daniel Bressler

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse

By: Daniel Bresler, CyOps Team Leader .NET binary abuse is not overly sophisticated, nor is it a new method of […]

Cynet-Raises-13M-to-Fuel-Growth
27 Jun 2018 • Inbal Aharoni

Cynet Raises $13M to Fuel Growth

27 Jun 2018 • Inbal Aharoni

Cynet Raises $13M to Fuel Growth

Cynet-Raises-13M-to-Fuel-Growth

27 Jun 2018 • Inbal Aharoni

Now Available for Download: The CISO Handbook

A new, important document for CISOs, CIOs and other cyber security professionals was released by the US government on June […]

27 Jun 2018 • Inbal Aharoni

Now Available for Download: The CISO Handbook

A new, important document for CISOs, CIOs and other cyber security professionals was released by the US government on June […]

SOC
31 May 2018 • Daniel Bressler

Do You Really Need a SOC?

By: Tzah Malka, Cynet Cyber SWAT Team Manager These days cyber criminals are more advanced than ever. Often, what stands […]

31 May 2018 • Daniel Bressler

Do You Really Need a SOC?

SOC

By: Tzah Malka, Cynet Cyber SWAT Team Manager These days cyber criminals are more advanced than ever. Often, what stands […]

Threat Intell.png
24 May 2018 • Shai Gabay

Making Threat Intelligence Work for You

As cyber attacks and threats have grown more complex, our knowledge of them has increased as well. As security professionals […]

24 May 2018 • Shai Gabay

Making Threat Intelligence Work for You

Threat Intell.png

As cyber attacks and threats have grown more complex, our knowledge of them has increased as well. As security professionals […]

Proactive Security Through Threat Hunting_Part 2 _1200x627
17 May 2018 • Shai Gabay

Proactive Security through Threat Hunting - Part 2

In part one of our series on taking a proactive approach to cyber security, we discussed the idea of active […]

17 May 2018 • Shai Gabay

Proactive Security through Threat Hunting - Part 2

Proactive Security Through Threat Hunting_Part 2 _1200x627

In part one of our series on taking a proactive approach to cyber security, we discussed the idea of active […]

The-good-the-bad
07 May 2018 • Inbal Aharoni

The Good & the Bad of the Cyber Hack - Part 1

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka the Kevin Mitnicks […]

07 May 2018 • Inbal Aharoni

The Good & the Bad of the Cyber Hack - Part 1

The-good-the-bad

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka the Kevin Mitnicks […]

Machine-Learning
29 Apr 2018 • Inbal Aharoni

Machine Learning, Artificial Intelligence & Security

Our lives are more and more Mister Robot, and the industries which surround our lives are increasingly integrating Machine Learning […]

29 Apr 2018 • Inbal Aharoni

Machine Learning, Artificial Intelligence & Security

Machine-Learning

Our lives are more and more Mister Robot, and the industries which surround our lives are increasingly integrating Machine Learning […]

BYOD
16 Apr 2018 • Dori Harpaz

BYOD & the Weakest Link

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore, […]

16 Apr 2018 • Dori Harpaz

BYOD & the Weakest Link

BYOD

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore, […]

The-evolution-of-the-attack
08 Apr 2018 • Inbal Aharoni

The Evolution of the Attack Kill Chain

Born of Necessity Way back in 2011, Lockheed Martin introduced the cyber attack kill chain to the world. It was […]

08 Apr 2018 • Inbal Aharoni

The Evolution of the Attack Kill Chain

The-evolution-of-the-attack

Born of Necessity Way back in 2011, Lockheed Martin introduced the cyber attack kill chain to the world. It was […]

Big-Data
01 Apr 2018 • Inbal Aharoni

Can Big Data Ever Be Secure?

Big Data makes for big headlines. We talk about everything from its applications – with more and more companies using […]

01 Apr 2018 • Inbal Aharoni

Can Big Data Ever Be Secure?

Big-Data

Big Data makes for big headlines. We talk about everything from its applications – with more and more companies using […]

The-Orbitz-Attack
25 Mar 2018 • Dori Harpaz

The Orbitz Attack & the Visibility Achilles Heel

You’ve Been Breached – Welcome to the Club “Your account information may have been compromised.” Expedia subsidiary Orbitz welcomed 880,000 […]

25 Mar 2018 • Dori Harpaz

The Orbitz Attack & the Visibility Achilles Heel

The-Orbitz-Attack

You’ve Been Breached – Welcome to the Club “Your account information may have been compromised.” Expedia subsidiary Orbitz welcomed 880,000 […]

Italian Botnet Attacks_Blog
29 Jan 2018 • Dori Harpaz

The Italian Botnet Attacks

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic security platform successfully detects the […]

29 Jan 2018 • Dori Harpaz

The Italian Botnet Attacks

Italian Botnet Attacks_Blog

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic security platform successfully detects the […]

Fileless_blog_visual(i)
24 Jan 2018 • Joshua Adams

Stopping Hidden Threats: Fileless Attacks

Cybercrime never stands still. Online crooks are always looking for a new edge to make their attacks more effective and […]

24 Jan 2018 • Joshua Adams

Stopping Hidden Threats: Fileless Attacks

Fileless_blog_visual(i)

Cybercrime never stands still. Online crooks are always looking for a new edge to make their attacks more effective and […]

CCW(i)
25 Dec 2017 • Shai Gabay

Introducing Cynet Critical Component Whitelisting

Comprehensive Protection & Detection for Total Cyber Health   There are multiple parallels between the human body and a computer.  […]

25 Dec 2017 • Shai Gabay

Introducing Cynet Critical Component Whitelisting

CCW(i)

Comprehensive Protection & Detection for Total Cyber Health   There are multiple parallels between the human body and a computer.  […]

Uber 1200x627 1
22 Nov 2017 • Dori Harpaz

Cynet’s Response to Uber’s Extortion Payment

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breach impacting 57-million […]

22 Nov 2017 • Dori Harpaz

Cynet’s Response to Uber’s Extortion Payment

Uber 1200x627 1

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breach impacting 57-million […]

CSV_stopped
16 Nov 2017 • Joshua Adams

How Cynet Stops CSV / DDE Injections

CSV/DDE injection attacks have recently popped back up in the cyber world, with Cynet researchers noticing a surge in CSV […]

16 Nov 2017 • Joshua Adams

How Cynet Stops CSV / DDE Injections

CSV_stopped

CSV/DDE injection attacks have recently popped back up in the cyber world, with Cynet researchers noticing a surge in CSV […]

2017 rware 3 screens
09 Nov 2017 • Dori Harpaz

The Year of Ransomware

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size being impacted, shelling out millions of dollars […]

09 Nov 2017 • Dori Harpaz

The Year of Ransomware

2017 rware 3 screens

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size being impacted, shelling out millions of dollars […]

Ransomware Nightmare
31 Oct 2017 • Inbal Aharoni

2017: The Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted Europe and scarred institutions and […]

31 Oct 2017 • Inbal Aharoni

2017: The Ransomware Nightmare

Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted Europe and scarred institutions and […]

Bad Rabbit
25 Oct 2017 • Noam Zweig

A Technical View of Bad Rabbit: Blog Part 2

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the ransomware that has […]

25 Oct 2017 • Noam Zweig

A Technical View of Bad Rabbit: Blog Part 2

Bad Rabbit

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the ransomware that has […]

Bad Rabbit
25 Oct 2017 • Joshua Adams

Cynet Stopped Bad Rabbit: Blog Part 1

What is being labeled as ransomware makes an appearance again, the latest in 2017’s saga of attacks focused on corporate […]

25 Oct 2017 • Joshua Adams

Cynet Stopped Bad Rabbit: Blog Part 1

Bad Rabbit

What is being labeled as ransomware makes an appearance again, the latest in 2017’s saga of attacks focused on corporate […]

bank ny dfs
06 Sep 2017 • Inbal Aharoni

New York's Strict New Cyber Regulations: Just the Beginning

All eyes are on New York state as they institute the nation’s first of its kind cyber security oversight for […]

06 Sep 2017 • Inbal Aharoni

New York's Strict New Cyber Regulations: Just the Beginning

bank ny dfs

All eyes are on New York state as they institute the nation’s first of its kind cyber security oversight for […]

Lego2
22 Aug 2017 • Inbal Aharoni

Multiple Security Vendors… A Recipe for Disaster

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions to handle boutique attacks and unique […]

22 Aug 2017 • Inbal Aharoni

Multiple Security Vendors… A Recipe for Disaster

Lego2

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions to handle boutique attacks and unique […]

Münster, Germany - November 24, 2013:
10 Aug 2017 • Inbal Aharoni

The Black-and-White of Black & White Hat-ers

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered around a computer, trying to […]

10 Aug 2017 • Inbal Aharoni

The Black-and-White of Black & White Hat-ers

Münster, Germany - November 24, 2013:

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered around a computer, trying to […]

Blog Subjects.docx
30 Jul 2017 • Dori Harpaz

Living the CISO’s Nightmare? Simplify Your Security

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evolving. Keeping up is never easy. […]

30 Jul 2017 • Dori Harpaz

Living the CISO’s Nightmare? Simplify Your Security

Blog Subjects.docx

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evolving. Keeping up is never easy. […]

Münster, Germany - November 24, 2013:
23 Jul 2017 • Dori Harpaz

Healthcare Breaches – the Tip of the Cyber-Iceberg

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the cyber-iceberg. We are […]

23 Jul 2017 • Dori Harpaz

Healthcare Breaches – the Tip of the Cyber-Iceberg

Münster, Germany - November 24, 2013:

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the cyber-iceberg. We are […]

threats team
11 Jul 2017 • Noam Zweig

Ransomware Attacks Show Importance of Complex Protective Measures

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life. While terrorism targets the […]

11 Jul 2017 • Noam Zweig

Ransomware Attacks Show Importance of Complex Protective Measures

threats team

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life. While terrorism targets the […]

Final Threats infographic V8-01
05 Jul 2017 • Dori Harpaz

Ransomware is Getting Faster – Is Your Security Keeping Up?

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that has security professionals […]

05 Jul 2017 • Dori Harpaz

Ransomware is Getting Faster – Is Your Security Keeping Up?

Final Threats infographic V8-01

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that has security professionals […]

567
29 Jun 2017 • Noam Zweig

Petya or NotPetya - Cynet Stops It

The big conversation around the recent ransomware attacks has been – Petya or NotPetya? So we say – does it […]

29 Jun 2017 • Noam Zweig

Petya or NotPetya - Cynet Stops It

567

The big conversation around the recent ransomware attacks has been – Petya or NotPetya? So we say – does it […]

screen
28 Jun 2017 • Noam Zweig

A Technical Analysis of NotPetya

Unless you have been living under a rock, over the last couple days you probably heard a lot about Petya […]

28 Jun 2017 • Noam Zweig

A Technical Analysis of NotPetya

screen

Unless you have been living under a rock, over the last couple days you probably heard a lot about Petya […]

Petya movie screen capture
28 Jun 2017 • Shai Gabay

MS Patch is Not Enough - See Cynet Stop Petya

If you thought you were safe because you patched Eternal Blue with Microsoft’s MS17-010 patch, you should think again. Yes, June […]

28 Jun 2017 • Shai Gabay

MS Patch is Not Enough - See Cynet Stop Petya

Petya movie screen capture

If you thought you were safe because you patched Eternal Blue with Microsoft’s MS17-010 patch, you should think again. Yes, June […]

italian_flag02
15 Jun 2017 • Inbal Aharoni

Cynet Stops Ransomware Attacks in Italy Today

Our team of 24/7 security experts detected ransomware attacks on a number of our Italian customers today. The attacks, which […]

15 Jun 2017 • Inbal Aharoni

Cynet Stops Ransomware Attacks in Italy Today

italian_flag02

Our team of 24/7 security experts detected ransomware attacks on a number of our Italian customers today. The attacks, which […]

Lawyers_big
14 Jun 2017 • Dori Harpaz

Are Law Firms the Next Victims of Ransomware Bad Guys?

14 Jun 2017 • Dori Harpaz

Are Law Firms the Next Victims of Ransomware Bad Guys?

Lawyers_big

ciso blog
06 Jun 2017 • Inbal Aharoni

The IT Security Double Whammy

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security Solutions Cybersecurity is about preventing, detecting and […]

06 Jun 2017 • Inbal Aharoni

The IT Security Double Whammy

ciso blog

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security Solutions Cybersecurity is about preventing, detecting and […]

Wannacry Banner blog
18 May 2017 • Inbal Aharoni

Ransomware Breaks the Bank – Depending on How You Look at It

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe have shifted their focus from […]

18 May 2017 • Inbal Aharoni

Ransomware Breaks the Bank – Depending on How You Look at It

Wannacry Banner blog

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe have shifted their focus from […]

image001
13 May 2017 • Netanel Amar

Cynet 360 Stops WannaCry Ransomware

It’s being called the world’s biggest ransomware operation ever. The back-story is known to anyone even remotely following mainstream news […]

13 May 2017 • Netanel Amar

Cynet 360 Stops WannaCry Ransomware

image001

It’s being called the world’s biggest ransomware operation ever. The back-story is known to anyone even remotely following mainstream news […]

fb-image1
13 Dec 2016 • Eyal Gruner

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

An estimated 1.8-billion active monthly users trust Facebook to keep their accounts, user details and communications secure. On the one […]

13 Dec 2016 • Eyal Gruner

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

fb-image1

An estimated 1.8-billion active monthly users trust Facebook to keep their accounts, user details and communications secure. On the one […]

Tablet on a wooden desk - News
24 Nov 2016 • Inbal Aharoni

In Case You Missed It... News from the Cyber Headlines

DDoS Attacks Serve as Diversion While Real Hack Takes Place Hackers are playing smart, and businesses know it. According to […]

24 Nov 2016 • Inbal Aharoni

In Case You Missed It... News from the Cyber Headlines

Tablet on a wooden desk - News

DDoS Attacks Serve as Diversion While Real Hack Takes Place Hackers are playing smart, and businesses know it. According to […]

Tablet on a wooden desk - News
04 Nov 2016 • Inbal Aharoni

In Case You Missed It... News from the Cyber Headlines

Healthcare organizations and the high cost of ransomware Cyber attacks on healthcare organizations have the potential to carry not only […]

04 Nov 2016 • Inbal Aharoni

In Case You Missed It... News from the Cyber Headlines

Tablet on a wooden desk - News

Healthcare organizations and the high cost of ransomware Cyber attacks on healthcare organizations have the potential to carry not only […]

lgg3
28 Jan 2016 • Eyal Gruner

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

Overview BugSec and Cynet researchers discovered a severe security vulnerability in LG G3 smartphones which allows an attacker to run […]

28 Jan 2016 • Eyal Gruner

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

lgg3

Overview BugSec and Cynet researchers discovered a severe security vulnerability in LG G3 smartphones which allows an attacker to run […]

fire4
13 Jan 2016 • Netanel Amar

Vendors Say Not Worried About FireStorm

Following our last blog post, vendors say they are not worried about the FireStorm vulnerability – the video below shows […]

13 Jan 2016 • Netanel Amar

Vendors Say Not Worried About FireStorm

fire4

Following our last blog post, vendors say they are not worried about the FireStorm vulnerability – the video below shows […]

NGFWs post pic1
09 Dec 2015 • Netanel Amar

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of Offensive Security Stas Volfus uncovered the […]

09 Dec 2015 • Netanel Amar

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

NGFWs post pic1

BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of Offensive Security Stas Volfus uncovered the […]