See Cynet 360 AutoXDR™ in Action

Prefer a one-on-one demo? Click here

By clicking next I consent to the use of my personal data by Cynet in accordance with Cynet's Privacy Policy and by its partners

Request a Demo

Social Engineering: What you need to know to stay resilient

Social Engineering: What you need to know to stay resilient image

There’s a good chance you’ve been exposed to at least one social engineering attack. Unless you don’t have a phone. Or email. Or the internet. And you don’t go outside.   And if you’re an IT or security team lead -... READ MORE

Adam Bar Zeev – Threat ResearcherMay 12, 2022

Social Engineering: What you need to know to stay resilient image
Orion Threat Alert: Flight of the BumbleBee image

Orion Threat Alert: Flight of the BumbleBee

By: Max Malyutin – Orion Threat Research Team Leader  Orion, Cynet’s Threat Research and... READ MORE

Max Malyutin – Orion Threat Research Team LeaderApril 14, 2022

Learn how to interpret the 2022 MITRE ATT&CK Evaluation results image

Learn how to interpret the 2022 MITRE ATT&CK Evaluation results

Update: This blog post was edited on April 8, 2022, to provide clarification on Cynet’s resul... READ MORE

Kindra CantrellApril 1, 2022

CyOps Lighthouse - a Peek into the Darknet image

CyOps Lighthouse - a Peek into the Darknet

CyOps Lighthouse - a Peek into the Darknet The Darknet is home to many underground hacking foru... READ MORE

Ronen AhdutMarch 13, 2022

Cynet is #2 in G2's Best Security Products List! image

Cynet is #2 in G2's Best Security Products List!

G2 has been very kind to us this year. Today they announced their 50 Best Security Products Lis... READ MORE

Tricia HowardFebruary 8, 2022

Spilling the Visibili-tea image

Spilling the Visibili-tea

Every single vendor out there has some sort of story on threat visibility. It’s been a topic... READ MORE

Tricia HowardFebruary 2, 2022

XDR - A game changer for MSSPs image

XDR - A game changer for MSSPs

MSSP’s: what would SMBs do without you? As someone who spent a significant portion of her car... READ MORE

Tricia HowardJanuary 31, 2022

G2 Winter Report: Cynet rated #1 in best XDR, MDR, EDR and Incident Response Solutions image

G2 Winter Report: Cynet rated #1 in best XDR, MDR, EDR and Incident Response Solutions

Did someone say award season? As was announced in PR Newswire last week – we were recognized... READ MORE

Tricia HowardJanuary 18, 2022

Cynet Named a “Pioneer in XDR” by eSecurityPlanet image

Cynet Named a “Pioneer in XDR” by eSecurityPlanet

  Cynet was recently recognized as one of the top XDR providers in 2021 by eSecurityPla... READ MORE

Kindra CantrellSeptember 30, 2021

Cynet and Crowstrike Rank Best in eSecurity Planet’s Newest Top EDR Providers for July 2021 image

Cynet and Crowstrike Rank Best in eSecurity Planet’s Newest Top EDR Providers for July 2021

Crowdstrike and Cynet have outperformed the pack in eSecurity Planet’s most recent update... READ MORE

Inbal AharoniSeptember 2, 2021

PrintNightmare - Windows Print Spooler Patched Vulnerability Remains Exploitable image

PrintNightmare - Windows Print Spooler Patched Vulnerability Remains Exploitable

Introduction On June 29th, security researchers demonstrated that the patch Microsoft release... READ MORE

Asaf Perlman & Almog Shotland - CyOps AnalystsJuly 1, 2021

Cynet Participates in Locked Shields 2021 image

Cynet Participates in Locked Shields 2021

Last week, Cynet CyOps participated in the annual cyber exercise organized by NATO Cooperative... READ MORE

Asaf Perlman, CyOps AnalystApril 20, 2021

Cynet Reveals its MITRE ATT&CK 2020 Evaluation Results image

Cynet Reveals its MITRE ATT&CK 2020 Evaluation Results

Cynet Achieves 100% Visibility and Detection Across All Steps of the MITRE Carbanak+FIN7 ATT&am... READ MORE

George Tubin, Aviad HasnisApril 20, 2021

Cynet vs. HAFNIUM image

Cynet vs. HAFNIUM

By: Max Malyutin – Sr. Threat Researcher Introduction Cynet’s customers are fully protected... READ MORE

Kindra CantrellMarch 7, 2021

China Chopper Observed in Recent MS Exchange Server Attacks image

China Chopper Observed in Recent MS Exchange Server Attacks

By: Max Malyutin - Sr. Threat Researcher Overview On Monday, March 2, 2021, Microsoft publicly... READ MORE

Kindra CantrellMarch 4, 2021

2021 Survey of CISOs with Small Security Teams: The Push for More Usable Cybersecurity Technologies image

2021 Survey of CISOs with Small Security Teams: The Push for More Usable Cybersecurity Technologies

Cynet just released what may be the first-ever survey of CISOs with small security teams (acces... READ MORE

Inbal AharoniJanuary 26, 2021

Respond at The Speed of Light image

Respond at The Speed of Light

Whether you are a big hitter in the cybersecurity landscape, with your own SOC team, or you are... READ MORE

Kindra CantrellJanuary 4, 2021

Selecting The Right XDR Provider image

Selecting The Right XDR Provider

You might be forgiven for wondering why, with all of the sophisticated cybersecurity systems at... READ MORE

Kindra CantrellDecember 31, 2020

Incident Responses Are an Integral Part Of Cybersecurity image

Incident Responses Are an Integral Part Of Cybersecurity

Incident Responses, or IRs are an integral part of cybersecurity. Generally triggered by securi... READ MORE

Kindra CantrellDecember 28, 2020

Security Team Assessment image

Security Team Assessment

2020 has been an unusual year, and as it draws to a close, focus is now turned onto the budgeta... READ MORE

Kindra CantrellDecember 24, 2020

How Incident Response Companies Choose IR Tools image

How Incident Response Companies Choose IR Tools

An Internet Response (IR) is a company’s organized reaction to managing a cybersecurity breac... READ MORE

Kindra CantrellDecember 21, 2020

COVID-19's Impact on Cyber Security image

COVID-19's Impact on Cyber Security

The Covid-19 pandemic has affected multiple areas of our lives, so it was probably inevitable t... READ MORE

Aviad HasnisDecember 17, 2020

Cynet Security Critical Update - SolarWinds Supply-Chain Attack image

Cynet Security Critical Update - SolarWinds Supply-Chain Attack

Last Sunday, December 13th, the IT industry in general, and the IT Security sector specifically... READ MORE

Aviad HasnisDecember 15, 2020

The Services You Should Expect From Your MDR Provider image

The Services You Should Expect From Your MDR Provider

Few CISOs can claim to know all there is to know about cybersecurity—their job involves so mu... READ MORE

Aviad HasnisDecember 14, 2020

FireEyes’ latest breach leads to Red Team Tools exfiltration image

FireEyes’ latest breach leads to Red Team Tools exfiltration

In response to the events reported by FireEye, we would like to give you a quick update of wh... READ MORE

Aviad HasnisDecember 13, 2020

Why MSSPs Need Multitenant Security Solutions image

Why MSSPs Need Multitenant Security Solutions

The task of the Managed Security Service Provider or MSSP is not an easy one. Their job is to p... READ MORE

Aviad HasnisDecember 7, 2020

Cybersecurity Budget Template image

Cybersecurity Budget Template

As the CISO of your company, one of the critical events of the year is planning the forthcoming... READ MORE

Aviad HasnisNovember 30, 2020

How To Get Your Hands on Deception Technology image

How To Get Your Hands on Deception Technology

It is every security manager’s worst nightmare—the thought of a random hacker breaking into... READ MORE

Aviad HasnisNovember 24, 2020

How Do You Know If You’re Getting Enough Value From Your EDR Solution? image

How Do You Know If You’re Getting Enough Value From Your EDR Solution?

Many companies use Endpoint Detection and Response (EDR) solutions as their primary breach prev... READ MORE

George TubinOctober 28, 2020

Cynet 2020 - Fall Platform Release: XDR, Response Automation, and MDR in one platform
 image

Cynet 2020 - Fall Platform Release: XDR, Response Automation, and MDR in one platform


The Cynet 4.0 release includes a major upgrade to the Cynet platform Most product releases,... READ MORE

George TubinSeptember 8, 2020

Taking Prevention, Detection and Response to the Next Level with Extended Detection and Response (XDR) image

Taking Prevention, Detection and Response to the Next Level with Extended Detection and Response (XDR)

Cybersecurity Needs a Rebuild, Not Duct Tape  Cyberthreat protection is broken.  If it wasn... READ MORE

George TubinAugust 17, 2020

Threat Report: Lockbit Ransomware image

Threat Report: Lockbit Ransomware

EXECUTIVE SUMMARY LockBit is a relatively new Ransomware that started in September 2019, where... READ MORE

Omer SolomonJune 3, 2020

Cynet 2020 IR Challenge Solutions image

Cynet 2020 IR Challenge Solutions

Introduction Why did we create the IR Challenge? The IR challenge consists of 25 challenges in... READ MORE

Yiftach KeshetMay 14, 2020

Cynet Launches the First of its Kind Public Incident Response ‘Capture the Evidence’ Challenge – with a First Prize of $5,000 image

Cynet Launches the First of its Kind Public Incident Response ‘Capture the Evidence’ Challenge – with a First Prize of $5,000

Today, we're proud to announce the launch of a first of its kind challenge to enable Incident R... READ MORE

Yiftach KeshetApril 21, 2020

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date image

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into... READ MORE

Yiftach KeshetMarch 30, 2020

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide image

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide

The global Coronavirus epidemic impacts economies worldwide, creating a new reality in which ma... READ MORE

Yiftach KeshetMarch 15, 2020

Warning Signs That You May Be Under an APT Attack image

Warning Signs That You May Be Under an APT Attack

For corporate cybersecurity professionals all around the globe, the threat of an APT Attack i... READ MORE

Yiftach KeshetFebruary 13, 2020

Browser Exploits – Legitimate Web Surfing Turned Death Trap image

Browser Exploits – Legitimate Web Surfing Turned Death Trap

On January 7th, the Mozilla Foundation disclosed a flaw in Firefox 72 that made it possible f... READ MORE

Yiftach KeshetJanuary 28, 2020

The State of Breach Protection 2020 | Global Survey and Industry Report image

The State of Breach Protection 2020 | Global Survey and Industry Report

What are the key considerations security decision makers should take into account when design... READ MORE

Yiftach KeshetJanuary 20, 2020

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild image

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild

There’s a good chance you've heard of EternalBlue, the infamous exploit responsible for a sle... READ MORE

Yiftach KeshetJanuary 2, 2020

Botnet Attacks: Transforming Your IT Resources into an Army of Zombies image

Botnet Attacks: Transforming Your IT Resources into an Army of Zombies

One computer program that automatically performs a repetitive malicious task is called a bot. M... READ MORE

Yiftach KeshetDecember 22, 2019

Download 2020 Cybersecurity Salary Survey Results image

Download 2020 Cybersecurity Salary Survey Results

The 2020 Cybersecurity Salary Survey was an online survey published to gain insight into the de... READ MORE

Yiftach KeshetDecember 11, 2019

Cryptominers: The Silent Leeches Draining Your Computing Resources image

Cryptominers: The Silent Leeches Draining Your Computing Resources

Today, we’re surrounded by an endless supply of devices, all with some amount of computing... READ MORE

Yiftach KeshetNovember 14, 2019

Exploit Kits: Their Evolution, Trends and Impact image

Exploit Kits: Their Evolution, Trends and Impact

What Are Exploit Kits? Exploit kits are a type of all-inclusive, automated, and rapidly deploya... READ MORE

Yiftach KeshetNovember 7, 2019

The 7 Best Free and Open-Source Incident Response Tools image

The 7 Best Free and Open-Source Incident Response Tools

What Is Incident Response? Being prepared is key to responding to security incidents in an accu... READ MORE

Yiftach KeshetOctober 24, 2019

6 Incident Response Steps for Effective Security Event Mitigation image

6 Incident Response Steps for Effective Security Event Mitigation

Like any other emergency situation, security incidents require swift, coordinated action. But o... READ MORE

Yiftach KeshetOctober 3, 2019

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks? image

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malwa... READ MORE

Yiftach KeshetSeptember 25, 2019

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond image

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

Back in the early days of malware, scammers spread their wares around from user to user via inf... READ MORE

Yiftach KeshetSeptember 15, 2019

How the Next Generation of EDR Turns the Tables on Hackers image

How the Next Generation of EDR Turns the Tables on Hackers

Endpoint - Where the Interesting Stuff Takes Place The endpoint has always been the ultimate at... READ MORE

Yiftach KeshetSeptember 12, 2019

A Guide to Rootkit Detection: History, Methods and More image

A Guide to Rootkit Detection: History, Methods and More

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home... READ MORE

Yiftach KeshetAugust 29, 2019

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats image

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by in... READ MORE

Yiftach KeshetAugust 22, 2019

Protecting Against Advanced Persistent Threats in 2019 and Beyond  image

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goa... READ MORE

Yiftach KeshetAugust 15, 2019

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant image

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware,... READ MORE

Cynet LabsJuly 24, 2019

Incident Response at the Speed of Light image

Incident Response at the Speed of Light

As organizations come to the realization that they cannot skimp on security, they are increasin... READ MORE

Yiftach KeshetJuly 9, 2019

The Definitive Security for Management PPT Template image

The Definitive Security for Management PPT Template

People, not Technology Cybersecurity is never just about technology. At the end of the day, it... READ MORE

Yiftach KeshetJuly 3, 2019

Four SOC 2 Technical Controls That You Want to Get Right! image

Four SOC 2 Technical Controls That You Want to Get Right!

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these a... READ MORE

Rob BlackJune 26, 2019

Cynet Free Visibility Campaign Provides Full Insight into Internal Network image

Cynet Free Visibility Campaign Provides Full Insight into Internal Network

One of the biggest challenges facing IT security teams is protecting organizational assets, as... READ MORE

Yiftach KeshetJune 11, 2019

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant image

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences... READ MORE

Cynet LabsJune 5, 2019

The Easiest Threat Prevention - Streamlining Software Vulnerability Management image

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

May 12th marked the second anniversary of one of the most globally devastating cyberattacks in... READ MORE

Yiftach KeshetMay 27, 2019

Cynet Insights on Gartner’s Top 10 Security Projects for 2019 image

Cynet Insights on Gartner’s Top 10 Security Projects for 2019

When it comes to security, prioritization is often the most used word. With an ever-increasing... READ MORE

Yiftach KeshetMay 13, 2019

Introducing Cynet's Free IR Tool for Organizations & Cyber Responders image

Introducing Cynet's Free IR Tool for Organizations & Cyber Responders

As organizations have become more aware of the very real threat of breach, and as security prac... READ MORE

Yiftach KeshetMay 7, 2019

5 Tips To Help Small to Mid-Sized Businesses Improve Cybersecurity image

5 Tips To Help Small to Mid-Sized Businesses Improve Cybersecurity

Cybersecurity threats need to be taken more seriously by businesses of all sizes. Security brea... READ MORE

Wade P. RichmondApril 29, 2019

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform image

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform

The Cynet 360 platform is the subject of a new analyst review put out by 451 Research, "Cynet... READ MORE

Inbal AharoniApril 18, 2019

IDC:  Forging a Solution for Comprehensive, Integrated Security with Cynet image

IDC: Forging a Solution for Comprehensive, Integrated Security with Cynet

In their new vendor profile, “Cynet: Forging a Solution for Comprehensive, Integrated Secur... READ MORE

Inbal AharoniApril 15, 2019

One Bot Campaign and Three Cyber Protection Insights image

One Bot Campaign and Three Cyber Protection Insights

Introduction On the course of our ongoing analysis of telemetry and files within our install ba... READ MORE

Yiftach KeshetApril 11, 2019

Mid-sized and Small Businesses Cybersecurity: Top 3 Myths image

Mid-sized and Small Businesses Cybersecurity: Top 3 Myths

By Wade P. Richmond If you follow ANY news these days, you can’t help but become aware of mo... READ MORE

Wade P. RichmondApril 8, 2019

Threat Landscape Insights – Small and Mid-Sized Organizations Advance to the First Line of Fire image

Threat Landscape Insights – Small and Mid-Sized Organizations Advance to the First Line of Fire

New Threat Trends Crossing-checking various independent threat reports reveals that 2018 featu... READ MORE

Yiftach KeshetApril 4, 2019

Free Threat Assessment Offering for Mid-Sized and Large Organizations image

Free Threat Assessment Offering for Mid-Sized and Large Organizations

Know Your Risk Visibility into an environment attack surface is the fundamental cornerstone to... READ MORE

Yiftach KeshetApril 2, 2019

New Wave of Ursnif Swarms Europe image

New Wave of Ursnif Swarms Europe

Cynet’s team of security analysts and threat researchers have uncovered a new wave of attacks... READ MORE

Yiftach KeshetMarch 28, 2019

Cynet Breach Protection Platform – Full Protection from LockerGoga Ransomware image

Cynet Breach Protection Platform – Full Protection from LockerGoga Ransomware

The Ransomware Race Ransomware attacks are common reality. However, the recent variants of Lock... READ MORE

Yiftach KeshetMarch 28, 2019

Reflections on Consolidation Trends – Go Shopping or Go Native image

Reflections on Consolidation Trends – Go Shopping or Go Native

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cybers... READ MORE

Yiftach KeshetMarch 26, 2019

Refund and Replace with Cynet Security Platform image

Refund and Replace with Cynet Security Platform

Rip Refund and Replace with Cynet Security Platform The Hunt for Advanced Threat Protection I... READ MORE

Yiftach KeshetMarch 20, 2019

Reflections on M&A Cybersecurity Issues image

Reflections on M&A Cybersecurity Issues

The latest testimonial on the Marriot data breach throws another spotlight on the security risk... READ MORE

Yiftach KeshetMarch 18, 2019

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins image

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins

By: Ron Lifinski and Haim Zigel A Cynet Research Blog -  Cyberattacks are continuously evolv... READ MORE

Ron Lifinski and Haim ZigelMarch 12, 2019

5 Steps to Achieving PCI Compliance image

5 Steps to Achieving PCI Compliance

Meeting PCI Compliance Requirements It can be a difficult yet extremely important task for all... READ MORE

Wade P. RichmondMarch 5, 2019

2019 INDUSTRY REPORT - Mid-Sized Organizations: The Urgent Need for Comprehensive Simplicity in Cyber Defense image

2019 INDUSTRY REPORT - Mid-Sized Organizations: The Urgent Need for Comprehensive Simplicity in Cyber Defense

The Urgent Need for Comprehensive Simplicity in Cyber Defense During the month of November 2018... READ MORE

Dori HarpazFebruary 7, 2019

How to Secure Your Mid-Sized Organization from the Next Cyber Attack image

How to Secure Your Mid-Sized Organization from the Next Cyber Attack

If you are responsible for the cybersecurity of a medium-sized company, you may assume your org... READ MORE

Inbal AharoniJanuary 15, 2019

Securing Your Organization's Network on a Shoestring image

Securing Your Organization's Network on a Shoestring

In this blog post, we will discuss how to protect your resource-constrained organization’s en... READ MORE

Eyal GrunerJanuary 8, 2019

Self-Audit Guide: Cybersecurity Effectiveness for the Resource-Constrained Organization image

Self-Audit Guide: Cybersecurity Effectiveness for the Resource-Constrained Organization

A Primer for Moving Beyond AV and Firewalls: The Problem - As software systems become more dist... READ MORE

Eyal GrunerJanuary 3, 2019

How Hackers Use DNS Tunneling to Own Your Network image

How Hackers Use DNS Tunneling to Own Your Network

By: Ron Lifinski, Cyber Security Researcher DNS Tunneling Most organizations have a firewall t... READ MORE

Ron LifinskiOctober 22, 2018

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse image

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse

By: Daniel Bresler, CyOps Team Leader .NET binary abuse is not overly sophisticated, nor is it... READ MORE

Daniel BresslerAugust 28, 2018

Cynet Raises $13M to Fuel Growth image

Cynet Raises $13M to Fuel Growth

[vc_row][vc_column][vc_column_text]As part of its mission to combine easy management with top-t... READ MORE

Inbal AharoniJune 27, 2018

Now Available for Download: The CISO Handbook image

Now Available for Download: The CISO Handbook

A new, important document for CISOs, CIOs and other cyber security professionals was released b... READ MORE

Inbal AharoniJune 27, 2018

Do You Really Need a SOC? image

Do You Really Need a SOC?

By: Tzah Malka, Cynet Cyber SWAT Team Manager These days cyber criminals are more advanced tha... READ MORE

Daniel BresslerMay 31, 2018

Making Threat Intelligence Work for You image

Making Threat Intelligence Work for You

As cyber attacks and threats have grown more complex, our knowledge of them has increased as we... READ MORE

Shai GabayMay 24, 2018

Proactive Security through Threat Hunting - Part 2 image

Proactive Security through Threat Hunting - Part 2

In part one of our series on taking a proactive approach to cyber security, we discussed the id... READ MORE

Shai GabayMay 17, 2018

The Good & the Bad of the Cyber Hack - Part 1 image

The Good & the Bad of the Cyber Hack - Part 1

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka... READ MORE

Inbal AharoniMay 7, 2018

Machine Learning, Artificial Intelligence & Security image

Machine Learning, Artificial Intelligence & Security

Our lives are more and more Mister Robot, and the industries which surround our lives are incre... READ MORE

Inbal AharoniApril 29, 2018

BYOD & the Weakest Link image

BYOD & the Weakest Link

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore,... READ MORE

Dori HarpazApril 16, 2018

The Evolution of the Attack Kill Chain image

The Evolution of the Attack Kill Chain

Born of Necessity - The Cyber Kill Chain Way back in 2011, Lockheed Martin introduced the cyber... READ MORE

Inbal AharoniApril 8, 2018

Can Big Data Ever Be Secure? image

Can Big Data Ever Be Secure?

Big Data makes for big headlines. We talk about everything from its applications – with more... READ MORE

Inbal AharoniApril 1, 2018

The Orbitz Attack & the Visibility Achilles Heel image

The Orbitz Attack & the Visibility Achilles Heel

You’ve Been Breached – Welcome to the Club “Your account information may have been compr... READ MORE

Dori HarpazMarch 25, 2018

The Italian Botnet Attacks image

The Italian Botnet Attacks

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic s... READ MORE

Dori HarpazJanuary 29, 2018

Stopping Hidden Threats: Fileless Attacks image

Stopping Hidden Threats: Fileless Attacks

Cybercrime never stands still. Online crooks are always looking for a new edge to make their at... READ MORE

Joshua AdamsJanuary 24, 2018

Introducing Cynet Critical Component Whitelisting image

Introducing Cynet Critical Component Whitelisting

Comprehensive Protection & Detection for Total Cyber Health   There are multiple parallel... READ MORE

Shai GabayDecember 25, 2017

Cynet’s Response to Uber’s Extortion Payment image

Cynet’s Response to Uber’s Extortion Payment

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breac... READ MORE

Dori HarpazNovember 22, 2017

How Cynet Stops CSV / DDE Injections image

How Cynet Stops CSV / DDE Injections

CSV/DDE injection attacks have recently popped back up in the cyber world, with Cynet researche... READ MORE

Joshua AdamsNovember 16, 2017

The Year of Ransomware image

The Year of Ransomware

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size... READ MORE

Dori HarpazNovember 9, 2017

2017: The Ransomware Nightmare image

2017: The Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted... READ MORE

Inbal AharoniOctober 31, 2017

A Technical View of Bad Rabbit: Blog Part 2 image

A Technical View of Bad Rabbit: Blog Part 2

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the ransom... READ MORE

Noam ZweigOctober 25, 2017

Cynet Stopped Bad Rabbit: Blog Part 1 image

Cynet Stopped Bad Rabbit: Blog Part 1

What is being labeled as ransomware makes an appearance again, the latest in 2017's saga of att... READ MORE

Joshua AdamsOctober 25, 2017

New York's Strict New Cyber Regulations: Just the Beginning image

New York's Strict New Cyber Regulations: Just the Beginning

All eyes are on New York state as they institute the nation’s first of its kind cyber securit... READ MORE

Inbal AharoniSeptember 6, 2017

Multiple Security Vendors… A Recipe for Disaster image

Multiple Security Vendors… A Recipe for Disaster

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions to... READ MORE

Inbal AharoniAugust 22, 2017

The Black-and-White of Black & White Hat-ers image

The Black-and-White of Black & White Hat-ers

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered aroun... READ MORE

Inbal AharoniAugust 10, 2017

Living the CISO’s Nightmare? Simplify Your Security image

Living the CISO’s Nightmare? Simplify Your Security

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evo... READ MORE

Dori HarpazJuly 30, 2017

Healthcare Breaches – the Tip of the Cyber-Iceberg image

Healthcare Breaches – the Tip of the Cyber-Iceberg

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the c... READ MORE

Dori HarpazJuly 23, 2017

Ransomware Attacks Show Importance of Complex Protective Measures image

Ransomware Attacks Show Importance of Complex Protective Measures

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life. Wh... READ MORE

Noam ZweigJuly 11, 2017

Ransomware is Getting Faster – Is Your Security Keeping Up? image

Ransomware is Getting Faster – Is Your Security Keeping Up?

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that has... READ MORE

Dori HarpazJuly 5, 2017

Petya or NotPetya - Cynet Stops It image

Petya or NotPetya - Cynet Stops It

The big conversation around the recent ransomware attacks has been - Petya or NotPetya? So we s... READ MORE

Noam ZweigJune 29, 2017

A Technical Analysis of NotPetya image

A Technical Analysis of NotPetya

Unless you have been living under a rock, over the last couple days you probably heard a lot ab... READ MORE

Noam ZweigJune 28, 2017

MS Patch is Not Enough - See Cynet Stop Petya image

MS Patch is Not Enough - See Cynet Stop Petya

If you thought you were safe because you patched Eternal Blue with Microsoft's MS17-010 patch,... READ MORE

Shai GabayJune 28, 2017

Cynet Stops Ransomware Attacks in Italy Today image

Cynet Stops Ransomware Attacks in Italy Today

Our team of 24/7 security experts detected ransomware attacks on a number of our Italian custom... READ MORE

Inbal AharoniJune 15, 2017

Are Law Firms the Next Victims of Ransomware Bad Guys? image

Are Law Firms the Next Victims of Ransomware Bad Guys?

[vc_row][vc_column][vc_column_text]Are Law Firms the Next Victims of Ransomware Bad Guys? Last... READ MORE

Dori HarpazJune 14, 2017

The IT Security Double Whammy image

The IT Security Double Whammy

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security So... READ MORE

Inbal AharoniJune 6, 2017

Ransomware Breaks the Bank – Depending on How You Look at It image

Ransomware Breaks the Bank – Depending on How You Look at It

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe ha... READ MORE

Inbal AharoniMay 18, 2017

Cynet 360 Stops WannaCry Ransomware image

Cynet 360 Stops WannaCry Ransomware

It's being called the world's biggest ransomware operation ever. The back-story is known to a... READ MORE

Netanel AmarMay 13, 2017

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers image

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

An estimated 1.8-billion active monthly users trust Facebook to keep their accounts, user detai... READ MORE

Eyal GrunerDecember 13, 2016

In Case You Missed It... News from the Cyber Headlines image

In Case You Missed It... News from the Cyber Headlines

DDoS Attacks Serve as Diversion While Real Hack Takes Place Hackers are playing smart, and busi... READ MORE

Inbal AharoniNovember 24, 2016

In Case You Missed It... News from the Cyber Headlines image

In Case You Missed It... News from the Cyber Headlines

Healthcare organizations and the high cost of ransomware Cyber attacks on healthcare organizati... READ MORE

Inbal AharoniNovember 4, 2016

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack image

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

Overview BugSec and Cynet researchers discovered a severe security vulnerability in LG G3 smart... READ MORE

Eyal GrunerJanuary 28, 2016

Vendors Say Not Worried About FireStorm image

Vendors Say Not Worried About FireStorm

Following our last blog post, vendors say they are not worried about the FireStorm vulnerabilit... READ MORE

Netanel AmarJanuary 13, 2016

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls image

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of... READ MORE

Netanel AmarDecember 9, 2015

Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration image

Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration

By Max Malyutin – Sr. Threat Researcher Introduction Cynet’s research and CyOps teams con... READ MORE

Inbal AharoniJanuary 1, 2015

Ransomware Removal: Recovering Your Files and Cleaning Up Infected Systems image

Ransomware Removal: Recovering Your Files and Cleaning Up Infected Systems

What is Ransomware? Ransomware is malware that encrypts user data and makes it inaccessible to... READ MORE

Inbal AharoniJanuary 1, 1970

cyops image

cyops

CyOps Important Security Update – ProxyShell Introduction A new attack vector named ProxyS... READ MORE

Kindra CantrellJanuary 1, 1970

Cynet Orion Team – Threat Intel and Research image

Cynet Orion Team – Threat Intel and Research

While tracking malicious spam campaigns at the beginning of September 2021, we discovered a new... READ MORE

Inbal AharoniJanuary 1, 1970

Into the Cryptoverse - When cryptocurrency and cybersecurity collide image

Into the Cryptoverse - When cryptocurrency and cybersecurity collide

By: Ronen Ahdut Executive Summary In the past, threat actors have used financial information... READ MORE

Inbal AharoniJanuary 1, 1970

Defense Evasion Techniques image

Defense Evasion Techniques

Last updated: November 1st, 2021 Written by: Ariel silver Analyzing, detecting, and preventin... READ MORE

Kindra CantrellJanuary 1, 1970

Lateral Movement Explained image

Lateral Movement Explained

Introduction The explosive growth of cloud-based technology in the past decade has generated a... READ MORE

Inbal AharoniJanuary 1, 1970

Monthly Ransomware activity image

Monthly Ransomware activity

Monthly Ransomware activity Written by: Maor Huli For October, we will introduce the fol... READ MORE

Inbal AharoniJanuary 1, 1970

 image

Cynet Ranked #2 of G2’s Best Security Products List G2 has been very kind to us this year.... READ MORE

Inbal AharoniJanuary 1, 1970

CYOPS IMPORTANT SECURITY UPDATE image

CYOPS IMPORTANT SECURITY UPDATE

CYOPS IMPORTANT SECURITY UPDATE As part of our ongoing threat intelligence efforts to discover... READ MORE

Inbal AharoniJanuary 1, 1970

Shelob Moonlight – Spinning a Larger Web image

Shelob Moonlight – Spinning a Larger Web

By Max Malyutin – Sr. Threat Researcher Introduction Cynet’s research and CyOps groups ar... READ MORE

Inbal AharoniJanuary 1, 1970

Security Update – Kaseya Supply-Chain Attack image

Security Update – Kaseya Supply-Chain Attack

By: Max Malyutin Executive Summary Kaseya VSA is a unified RMM solution that lets MSPs mainta... READ MORE

Inbal AharoniJanuary 1, 1970