334
14 Nov 2019 • Yiftach Keshet

Cryptominers: The Silent Leeches Draining Your Computing Resources

Today, we’re surrounded by an endless supply of devices, all with some amount of computing power. Cryptominer malware harnesses this […]

14 Nov 2019 • Yiftach Keshet

Cryptominers: The Silent Leeches Draining Your Computing Resources

334

Today, we’re surrounded by an endless supply of devices, all with some amount of computing power. Cryptominer malware harnesses this […]

22-(1)
25 Sep 2019 • Yiftach Keshet

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malware researchers Christopher Campbell […]

25 Sep 2019 • Yiftach Keshet

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

22-(1)

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malware researchers Christopher Campbell […]

banner2
22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

22 Aug 2019 • Yiftach Keshet

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

banner2

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by insiders who have access […]

12s
15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

15 Aug 2019 • Yiftach Keshet

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

12s

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goal of stealing and monitoring data, rather than […]

small-blog
24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]

24 Jul 2019 • Cynet Labs

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

small-blog

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware, discovering several interesting traits. In this […]

blog2
05 Jun 2019 • Cynet Labs

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences of the Ursnif banking […]

05 Jun 2019 • Cynet Labs

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

blog2

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences of the Ursnif banking […]

malicious-code-4036349__340
11 Apr 2019 • Yiftach Keshet

One Bot Campaign and Three Cyber Protection Insights

Introduction On the course of our ongoing analysis of telemetry and files within our install base, we have encountered several […]

11 Apr 2019 • Yiftach Keshet

One Bot Campaign and Three Cyber Protection Insights

malicious-code-4036349__340

Introduction On the course of our ongoing analysis of telemetry and files within our install base, we have encountered several […]

560 x 282 THE MALICIOUS QUARTETTE
12 Mar 2019 • Ron Lifinski and Haim Zigel

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins

By: Ron Lifinski and Haim Zigel A Cynet Research Blog –  Cyberattacks are continuously evolving in the attempt to stay […]

12 Mar 2019 • Ron Lifinski and Haim Zigel

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins

560 x 282 THE MALICIOUS QUARTETTE

By: Ron Lifinski and Haim Zigel A Cynet Research Blog –  Cyberattacks are continuously evolving in the attempt to stay […]

DnsTunneling
22 Oct 2018 • Ron Lifinski

How Hackers Use DNS Tunneling to Own Your Network

By: Ron Lifinski, Cyber Security Researcher Most organizations have a firewall that acts as a filter between their sensitive internal […]

22 Oct 2018 • Ron Lifinski

How Hackers Use DNS Tunneling to Own Your Network

DnsTunneling

By: Ron Lifinski, Cyber Security Researcher Most organizations have a firewall that acts as a filter between their sensitive internal […]

The-Orbitz-Attack
25 Mar 2018 • Dori Harpaz

The Orbitz Attack & the Visibility Achilles Heel

You’ve Been Breached – Welcome to the Club “Your account information may have been compromised.” Expedia subsidiary Orbitz welcomed 880,000 […]

25 Mar 2018 • Dori Harpaz

The Orbitz Attack & the Visibility Achilles Heel

The-Orbitz-Attack

You’ve Been Breached – Welcome to the Club “Your account information may have been compromised.” Expedia subsidiary Orbitz welcomed 880,000 […]

Italian Botnet Attacks_Blog
29 Jan 2018 • Dori Harpaz

The Italian Botnet Attacks

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic security platform successfully detects the […]

29 Jan 2018 • Dori Harpaz

The Italian Botnet Attacks

Italian Botnet Attacks_Blog

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic security platform successfully detects the […]

Fileless_blog_visual(i)
24 Jan 2018 • Joshua Adams

Stopping Hidden Threats: Fileless Attacks

Cybercrime never stands still. Online crooks are always looking for a new edge to make their attacks more effective and […]

24 Jan 2018 • Joshua Adams

Stopping Hidden Threats: Fileless Attacks

Fileless_blog_visual(i)

Cybercrime never stands still. Online crooks are always looking for a new edge to make their attacks more effective and […]

Bad Rabbit
25 Oct 2017 • Noam Zweig

A Technical View of Bad Rabbit: Blog Part 2

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the ransomware that has […]

25 Oct 2017 • Noam Zweig

A Technical View of Bad Rabbit: Blog Part 2

Bad Rabbit

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the ransomware that has […]

Bad Rabbit
25 Oct 2017 • Joshua Adams

Cynet Stopped Bad Rabbit: Blog Part 1

What is being labeled as ransomware makes an appearance again, the latest in 2017’s saga of attacks focused on corporate […]

25 Oct 2017 • Joshua Adams

Cynet Stopped Bad Rabbit: Blog Part 1

Bad Rabbit

What is being labeled as ransomware makes an appearance again, the latest in 2017’s saga of attacks focused on corporate […]

threats team
11 Jul 2017 • Noam Zweig

Ransomware Attacks Show Importance of Complex Protective Measures

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life. While terrorism targets the […]

11 Jul 2017 • Noam Zweig

Ransomware Attacks Show Importance of Complex Protective Measures

threats team

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life. While terrorism targets the […]

567
29 Jun 2017 • Noam Zweig

Petya or NotPetya - Cynet Stops It

The big conversation around the recent ransomware attacks has been – Petya or NotPetya? So we say – does it […]

29 Jun 2017 • Noam Zweig

Petya or NotPetya - Cynet Stops It

567

The big conversation around the recent ransomware attacks has been – Petya or NotPetya? So we say – does it […]

screen
28 Jun 2017 • Noam Zweig

A Technical Analysis of NotPetya

Unless you have been living under a rock, over the last couple days you probably heard a lot about Petya […]

28 Jun 2017 • Noam Zweig

A Technical Analysis of NotPetya

screen

Unless you have been living under a rock, over the last couple days you probably heard a lot about Petya […]

Petya movie screen capture
28 Jun 2017 • Shai Gabay

MS Patch is Not Enough - See Cynet Stop Petya

If you thought you were safe because you patched Eternal Blue with Microsoft’s MS17-010 patch, you should think again. Yes, June […]

28 Jun 2017 • Shai Gabay

MS Patch is Not Enough - See Cynet Stop Petya

Petya movie screen capture

If you thought you were safe because you patched Eternal Blue with Microsoft’s MS17-010 patch, you should think again. Yes, June […]

image001
13 May 2017 • Netanel Amar

Cynet 360 Stops WannaCry Ransomware

It’s being called the world’s biggest ransomware operation ever. The back-story is known to anyone even remotely following mainstream news […]

13 May 2017 • Netanel Amar

Cynet 360 Stops WannaCry Ransomware

image001

It’s being called the world’s biggest ransomware operation ever. The back-story is known to anyone even remotely following mainstream news […]