See Cynet 360 AutoXDR™ in Action

Prefer a one-on-one demo? Click here

By clicking next I consent to the use of my personal data by Cynet in accordance with Cynet's Privacy Policy and by its partners

Request a Demo

Uncategorized

Supercharge your resource-strapped security team image

Supercharge your resource-strapped security team

Microsoft, Toyota, Nvidia — cyberattacks on big corporations dominated news headlines this ye... READ MORE

Kindra Cantrell image Kindra CantrellAugust 25, 2022

6 steps to building a lean security framework image

6 steps to building a lean security framework

“Patchwork enforcement mechanisms continue to hamper efforts to control cybercrime.” – W... READ MORE

Michael Newell image Michael NewellAugust 17, 2022

CyOps Lighthouse: Eternity Project image

CyOps Lighthouse: Eternity Project

By Ronen Ahdut – Sr. CyOps Analyst The Darknet is home to many underground hacking forums.... READ MORE

Kindra Cantrell image Kindra CantrellAugust 10, 2022

Why Cynet is sponsoring the Houston Hurricanes in the World Series of Beep Baseball image

Why Cynet is sponsoring the Houston Hurricanes in the World Series of Beep Baseball

The beep of a ball. The crack of a bat. The roar of the crowd. Sound is what makes this sport s... READ MORE

Michael Newell image Michael NewellJuly 25, 2022

CyOps Lighthouse: Malware-as-a-service (MaaS) image

CyOps Lighthouse: Malware-as-a-service (MaaS)

By Ronen Ahdut – Sr. CyOps Analyst The Darknet is home to many underground hacking forums... READ MORE

Kindra Cantrell image Kindra CantrellJune 22, 2022

CyOps Threat Alert: Follina mitigated, the recent MSDT 0-Day Vulnerability Explained image

CyOps Threat Alert: Follina mitigated, the recent MSDT 0-Day Vulnerability Explained

By: Daniel Lippa – CyOps analyst Follina in a nutshell Disclosed on May 30th, CVE-2022-3019... READ MORE

Kindra Cantrell image Kindra CantrellJune 3, 2022

Orion Threat Alert: Flight of the BumbleBee image

Orion Threat Alert: Flight of the BumbleBee

By: Max Malyutin – Orion Threat Research Team Leader  Orion, Cynet’s Threat Research and... READ MORE

Kindra Cantrell image Kindra CantrellApril 14, 2022

Learn how to interpret the 2022 MITRE ATT&CK Evaluation results image

Learn how to interpret the 2022 MITRE ATT&CK Evaluation results

Update: This blog post was edited on April 8, 2022, to provide clarification on Cynet’s resul... READ MORE

Kindra Cantrell image Kindra CantrellApril 1, 2022

CyOps Lighthouse: Ransomware-as-a-Service (RaaS) image

CyOps Lighthouse: Ransomware-as-a-Service (RaaS)

The Darknet is home to many underground hacking forums. In these forums Cybercriminals talk fre... READ MORE

Kindra Cantrell image Kindra CantrellMarch 13, 2022

Cynet is #2 in G2's Best Security Products List! image

Cynet is #2 in G2's Best Security Products List!

G2 has been very kind to us this year. Today they announced their 50 Best Security Products Lis... READ MORE

Kindra Cantrell image Kindra CantrellFebruary 8, 2022

Cynet Ranked #2 of G2’s Best Security Products List image

Cynet Ranked #2 of G2’s Best Security Products List

Cynet Ranked #2 of G2’s Best Security Products List G2 has been very kind to us this y... READ MORE

Kindra Cantrell image Kindra CantrellFebruary 8, 2022

Spilling the Visibili-tea image

Spilling the Visibili-tea

Every single vendor out there has some sort of story on threat visibility. It’s been a topic... READ MORE

Kindra Cantrell image Kindra CantrellFebruary 2, 2022

XDR - A game changer for MSSPs image

XDR - A game changer for MSSPs

MSSP’s: what would SMBs do without you? As someone who spent a significant portion of her car... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 31, 2022

G2 Winter Report: Cynet rated #1 in best XDR, MDR, EDR and Incident Response Solutions image

G2 Winter Report: Cynet rated #1 in best XDR, MDR, EDR and Incident Response Solutions

Did someone say award season? As was announced in PR Newswire last week – we were recogniz... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 18, 2022

Lateral Movement Explained image

Lateral Movement Explained

Introduction The explosive growth of cloud-based technology in the past decade has generated a... READ MORE

Kindra Cantrell image Kindra CantrellDecember 22, 2021

Monthly Ransomware activity image

Monthly Ransomware activity

Monthly Ransomware activity Written by: Maor Huli For October, we will introduce the fol... READ MORE

Kindra Cantrell image Kindra CantrellOctober 30, 2021

Cynet Named a “Pioneer in XDR” by eSecurityPlanet image

Cynet Named a “Pioneer in XDR” by eSecurityPlanet

  Cynet was recently recognized as one of the top XDR providers in 2021 by eSecurit... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 30, 2021

Into the Cryptoverse - When cryptocurrency and cybersecurity collide image

Into the Cryptoverse - When cryptocurrency and cybersecurity collide

By: Ronen Ahdut Executive Summary In the past, threat actors have used financial information... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 9, 2021

Cynet and Crowstrike Rank Best in eSecurity Planet’s Newest Top EDR Providers for July 2021 image

Cynet and Crowstrike Rank Best in eSecurity Planet’s Newest Top EDR Providers for July 2021

Crowdstrike and Cynet have outperformed the pack in eSecurity Planet’s most recent update... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 2, 2021

CyOps Important Security Update – ProxyShell image

CyOps Important Security Update – ProxyShell

CyOps Important Security Update – ProxyShell Introduction A new attack vector named ProxySh... READ MORE

Kindra Cantrell image Kindra CantrellAugust 12, 2021

Security Update – Kaseya Supply-Chain Attack image

Security Update – Kaseya Supply-Chain Attack

By: Max Malyutin Executive Summary Kaseya VSA is a unified RMM solution that lets MSPs mainta... READ MORE

Kindra Cantrell image Kindra CantrellJuly 6, 2021

PrintNightmare - Windows Print Spooler Patched Vulnerability Remains Exploitable image

PrintNightmare - Windows Print Spooler Patched Vulnerability Remains Exploitable

Introduction On June 29th, security researchers demonstrated that the patch Microsoft rele... READ MORE

Kindra Cantrell image Kindra CantrellJuly 1, 2021

CYOPS IMPORTANT SECURITY UPDATE image

CYOPS IMPORTANT SECURITY UPDATE

CYOPS IMPORTANT SECURITY UPDATE As part of our ongoing threat intelligence efforts to discover... READ MORE

Kindra Cantrell image Kindra CantrellMay 4, 2021

Cynet Participates in Locked Shields 2021 image

Cynet Participates in Locked Shields 2021

Last week, Cynet CyOps participated in the annual cyber exercise organized by NATO Cooperative... READ MORE

Kindra Cantrell image Kindra CantrellApril 20, 2021

Cynet Reveals its MITRE ATT&CK 2020 Evaluation Results image

Cynet Reveals its MITRE ATT&CK 2020 Evaluation Results

Cynet Achieves 100% Visibility and Detection Across All Steps of the MITRE Carbanak+FIN7 ATT&am... READ MORE

Kindra Cantrell image Kindra CantrellApril 20, 2021

Cynet vs. HAFNIUM image

Cynet vs. HAFNIUM

By: Max Malyutin – Sr. Threat Researcher Introduction Cynet’s customers are fully protected... READ MORE

Kindra Cantrell image Kindra CantrellMarch 7, 2021

China Chopper Observed in Recent MS Exchange Server Attacks image

China Chopper Observed in Recent MS Exchange Server Attacks

By: Max Malyutin - Sr. Threat Researcher Overview On Monday, March 2, 2021, Microsoft publicly... READ MORE

Kindra Cantrell image Kindra CantrellMarch 4, 2021

2021 Survey of CISOs with Small Security Teams: The Push for More Usable Cybersecurity Technologies image

2021 Survey of CISOs with Small Security Teams: The Push for More Usable Cybersecurity Technologies

Cynet just released what may be the first-ever survey of CISOs with small security teams (acces... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 26, 2021

Respond at The Speed of Light image

Respond at The Speed of Light

Whether you are a big hitter in the cybersecurity landscape, with your own SOC team, or you are... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 4, 2021

Selecting The Right XDR Provider image

Selecting The Right XDR Provider

You might be forgiven for wondering why, with all of the sophisticated cybersecurity systems at... READ MORE

Kindra Cantrell image Kindra CantrellDecember 31, 2020

Incident Responses Are an Integral Part Of Cybersecurity image

Incident Responses Are an Integral Part Of Cybersecurity

Incident Responses, or IRs are an integral part of cybersecurity. Generally triggered by securi... READ MORE

Kindra Cantrell image Kindra CantrellDecember 28, 2020

Security Team Assessment image

Security Team Assessment

2020 has been an unusual year, and as it draws to a close, focus is now turned onto the budgeta... READ MORE

Kindra Cantrell image Kindra CantrellDecember 24, 2020

How Incident Response Companies Choose IR Tools image

How Incident Response Companies Choose IR Tools

An Internet Response (IR) is a company’s organized reaction to managing a cybersecurity breac... READ MORE

Kindra Cantrell image Kindra CantrellDecember 21, 2020

COVID-19's Impact on Cyber Security image

COVID-19's Impact on Cyber Security

The Covid-19 pandemic has affected multiple areas of our lives, so it was probably inevitable t... READ MORE

Kindra Cantrell image Kindra CantrellDecember 17, 2020

Cynet Security Critical Update - SolarWinds Supply-Chain Attack image

Cynet Security Critical Update - SolarWinds Supply-Chain Attack

Last Sunday, December 13th, the IT industry in general, and the IT Security sector specifically... READ MORE

Kindra Cantrell image Kindra CantrellDecember 15, 2020

The Services You Should Expect From Your MDR Provider image

The Services You Should Expect From Your MDR Provider

Few CISOs can claim to know all there is to know about cybersecurity—their job involves so mu... READ MORE

Kindra Cantrell image Kindra CantrellDecember 14, 2020

FireEyes’ latest breach leads to Red Team Tools exfiltration image

FireEyes’ latest breach leads to Red Team Tools exfiltration

In response to the events reported by FireEye, we would like to give you a quick update of... READ MORE

Kindra Cantrell image Kindra CantrellDecember 13, 2020

Why MSSPs Need Multitenant Security Solutions image

Why MSSPs Need Multitenant Security Solutions

The task of the Managed Security Service Provider or MSSP is not an easy one. Their job is to p... READ MORE

Kindra Cantrell image Kindra CantrellDecember 7, 2020

Cybersecurity Budget Template image

Cybersecurity Budget Template

As the CISO of your company, one of the critical events of the year is planning the forthcoming... READ MORE

Kindra Cantrell image Kindra CantrellNovember 30, 2020

How To Get Your Hands on Deception Technology image

How To Get Your Hands on Deception Technology

It is every security manager’s worst nightmare—the thought of a random hacker breaking into... READ MORE

Kindra Cantrell image Kindra CantrellNovember 24, 2020

How Do You Know If You’re Getting Enough Value From Your EDR Solution? image

How Do You Know If You’re Getting Enough Value From Your EDR Solution?

Many companies use Endpoint Detection and Response (EDR) solutions as their primary breach prev... READ MORE

Kindra Cantrell image Kindra CantrellOctober 28, 2020

Cynet 2020 - Fall Platform Release: XDR, Response Automation, and MDR in one platform
 image

Cynet 2020 - Fall Platform Release: XDR, Response Automation, and MDR in one platform


The Cynet 4.0 release includes a major upgrade to the Cynet platform Most product relea... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 8, 2020

Taking Prevention, Detection and Response to the Next Level with Extended Detection and Response (XDR) image

Taking Prevention, Detection and Response to the Next Level with Extended Detection and Response (XDR)

Cybersecurity Needs a Rebuild, Not Duct Tape  Cyberthreat protection is broken.  If it was... READ MORE

Kindra Cantrell image Kindra CantrellAugust 17, 2020

Threat Report: Lockbit Ransomware image

Threat Report: Lockbit Ransomware

EXECUTIVE SUMMARY LockBit is a relatively new Ransomware that started in September 2019, where... READ MORE

Kindra Cantrell image Kindra CantrellJune 3, 2020

Cynet 2020 IR Challenge Solutions image

Cynet 2020 IR Challenge Solutions

Introduction Why did we create the IR Challenge? The IR challenge consists of 25 challenges... READ MORE

Kindra Cantrell image Kindra CantrellMay 14, 2020

Cynet Launches the First of its Kind Public Incident Response ‘Capture the Evidence’ Challenge – with a First Prize of $5,000 image

Cynet Launches the First of its Kind Public Incident Response ‘Capture the Evidence’ Challenge – with a First Prize of $5,000

Today, we're proud to announce the launch of a first-of-its-kind challenge to enable Incident R... READ MORE

Kindra Cantrell image Kindra CantrellApril 21, 2020

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date image

Half of the Malware Detected in 2019 was Classified as Zero-Day Threats, Making it the Most Common Malware to Date

Technology and Intel is wrapping itself around our lives at an astonishing speed, slipping into... READ MORE

Kindra Cantrell image Kindra CantrellMarch 30, 2020

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide image

Recent Escalations in Cyberattacks in Italy Prove the Coronavirus Impact on Cybersecurity - Acting as a Warning for CISOs Worldwide

The global Coronavirus epidemic impacts economies worldwide, creating a new reality in which ma... READ MORE

Kindra Cantrell image Kindra CantrellMarch 15, 2020

Warning Signs That You May Be Under an APT Attack image

Warning Signs That You May Be Under an APT Attack

For corporate cybersecurity professionals all around the globe, the threat of an APT Attack... READ MORE

Kindra Cantrell image Kindra CantrellFebruary 13, 2020

The State of Breach Protection 2020 | Global Survey and Industry Report image

The State of Breach Protection 2020 | Global Survey and Industry Report

What are the key considerations security decision makers should take into account when desi... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 20, 2020

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild image

EternalBlue: The Lethal Nation-State Exploit Tool Gone Wild

There’s a good chance you've heard of EternalBlue, the infamous exploit responsible for a sle... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 2, 2020

Download 2020 Cybersecurity Salary Survey Results image

Download 2020 Cybersecurity Salary Survey Results

The 2020 Cybersecurity Salary Survey was an online survey published to gain insight into the de... READ MORE

Kindra Cantrell image Kindra CantrellDecember 11, 2019

Cryptominers: The Silent Leeches Draining Your Computing Resources image

Cryptominers: The Silent Leeches Draining Your Computing Resources

Today, we’re surrounded by an endless supply of devices, all with some amount of computin... READ MORE

Kindra Cantrell image Kindra CantrellNovember 14, 2019

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks? image

What Are LOLBins and How Do Attackers Use Them in Fileless Attacks?

What Is “Living off the Land?” The term “living off the land” (LOL) was coined by malwa... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 25, 2019

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond image

A Guide to Malware Detection Techniques: AV, NGAV, and Beyond

Back in the early days of malware, scammers spread their wares around from user to user via inf... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 15, 2019

How the Next Generation of EDR Turns the Tables on Hackers image

How the Next Generation of EDR Turns the Tables on Hackers

Endpoint - Where the Interesting Stuff Takes Place The endpoint has always been the ultimate a... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 12, 2019

A Guide to Rootkit Detection: History, Methods and More image

A Guide to Rootkit Detection: History, Methods and More

In mid-April 2019, a new and sophisticated malware threat began to appear on computers of home... READ MORE

Kindra Cantrell image Kindra CantrellAugust 29, 2019

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats image

Insider Threat Detection: Recognizing and Preventing One of Today’s Worst Threats

What Is an Insider Threat? As the name plainly suggests, insider threats are risks caused by i... READ MORE

Kindra Cantrell image Kindra CantrellAugust 22, 2019

Protecting Against Advanced Persistent Threats in 2019 and Beyond  image

Protecting Against Advanced Persistent Threats in 2019 and Beyond 

Advanced persistent threats (APTs) are targeted extended attacks usually conducted with the goa... READ MORE

Kindra Cantrell image Kindra CantrellAugust 15, 2019

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant image

Ransomware Never Dies – Analysis of New Sodinokibi Ransomware Variant

Summary CyOps, Cynet SOC team, recently encountered a new variant of the Sodinokibi ransomware... READ MORE

Kindra Cantrell image Kindra CantrellJuly 24, 2019

Incident Response at the Speed of Light image

Incident Response at the Speed of Light

As organizations come to the realization that they cannot skimp on security, they are increasin... READ MORE

Kindra Cantrell image Kindra CantrellJuly 9, 2019

The Definitive Security for Management PPT Template image

The Definitive Security for Management PPT Template

People, not Technology Cybersecurity is never just about technology. At the end of the day,... READ MORE

Kindra Cantrell image Kindra CantrellJuly 3, 2019

Four SOC 2 Technical Controls That You Want to Get Right! image

Four SOC 2 Technical Controls That You Want to Get Right!

I run into many organizations who are evaluating if they should get a SOC 2. Typically, these a... READ MORE

Kindra Cantrell image Kindra CantrellJune 26, 2019

Cynet Free Visibility Campaign Provides Full Insight into Internal Network image

Cynet Free Visibility Campaign Provides Full Insight into Internal Network

One of the biggest challenges facing IT security teams is protecting organizational assets, as... READ MORE

Kindra Cantrell image Kindra CantrellJune 11, 2019

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant image

The Ursnif Trojan: An Attack Overview and Zoom-In on New Variant

Over the course of the last few months, we at Cynet labs have encountered multiple occurrences... READ MORE

Kindra Cantrell image Kindra CantrellJune 5, 2019

The Easiest Threat Prevention - Streamlining Software Vulnerability Management image

The Easiest Threat Prevention - Streamlining Software Vulnerability Management

May 12th marked the second anniversary of one of the most globally devastating cyberattacks in... READ MORE

Kindra Cantrell image Kindra CantrellMay 27, 2019

Introducing Cynet's Free IR Tool for Organizations & Cyber Responders image

Introducing Cynet's Free IR Tool for Organizations & Cyber Responders

As organizations have become more aware of the very real threat of breach, and as security prac... READ MORE

Kindra Cantrell image Kindra CantrellMay 7, 2019

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform image

451 Research: Cynet Aims to Consolidate Breach-Protection Efforts in a Single Platform

The Cynet 360 platform is the subject of a new analyst review put out by 451 Research, "Cyn... READ MORE

Kindra Cantrell image Kindra CantrellApril 18, 2019

IDC:  Forging a Solution for Comprehensive, Integrated Security with Cynet image

IDC: Forging a Solution for Comprehensive, Integrated Security with Cynet

In their new vendor profile, “Cynet: Forging a Solution for Comprehensive, Integrated Sec... READ MORE

Kindra Cantrell image Kindra CantrellApril 15, 2019

One Bot Campaign and Three Cyber Protection Insights image

One Bot Campaign and Three Cyber Protection Insights

Introduction On the course of our ongoing analysis of telemetry and files within our install b... READ MORE

Kindra Cantrell image Kindra CantrellApril 11, 2019

Mid-sized and Small Businesses Cybersecurity: Top 3 Myths image

Mid-sized and Small Businesses Cybersecurity: Top 3 Myths

By Wade P. Richmond If you follow ANY news these days, you can’t help but become aware of... READ MORE

Kindra Cantrell image Kindra CantrellApril 8, 2019

Threat Landscape Insights – Small and Mid-Sized Organizations Advance to the First Line of Fire image

Threat Landscape Insights – Small and Mid-Sized Organizations Advance to the First Line of Fire

New Threat Trends Crossing-checking various independent threat reports reveals that 2018 fea... READ MORE

Kindra Cantrell image Kindra CantrellApril 4, 2019

Free Threat Assessment Offering for Mid-Sized and Large Organizations image

Free Threat Assessment Offering for Mid-Sized and Large Organizations

Know Your Risk Visibility into an environment attack surface is the fundamental cornerstone... READ MORE

Kindra Cantrell image Kindra CantrellApril 2, 2019

New Wave of Ursnif Swarms Europe image

New Wave of Ursnif Swarms Europe

Cynet’s team of security analysts and threat researchers have uncovered a new wave of attacks... READ MORE

Kindra Cantrell image Kindra CantrellMarch 28, 2019

Cynet Breach Protection Platform – Full Protection from LockerGoga Ransomware image

Cynet Breach Protection Platform – Full Protection from LockerGoga Ransomware

The Ransomware Race Ransomware attacks are common reality. However, the recent variants of Loc... READ MORE

Kindra Cantrell image Kindra CantrellMarch 28, 2019

Reflections on Consolidation Trends – Go Shopping or Go Native image

Reflections on Consolidation Trends – Go Shopping or Go Native

It’s the Age of Consolidation Consolidation is one of the top discussion issues in the cyber... READ MORE

Kindra Cantrell image Kindra CantrellMarch 26, 2019

Reflections on M&A Cybersecurity Issues image

Reflections on M&A Cybersecurity Issues

The latest testimonial on the Marriot data breach throws another spotlight on the security risk... READ MORE

Kindra Cantrell image Kindra CantrellMarch 18, 2019

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins image

The Malicious Quartette – Composition for the Attacker, WMI, CMD.EXE and Two LOLbins

By: Ron Lifinski and Haim Zigel A Cynet Research Blog -  Cyberattacks are continuously e... READ MORE

Kindra Cantrell image Kindra CantrellMarch 12, 2019

How Hackers Use DNS Tunneling to Own Your Network image

How Hackers Use DNS Tunneling to Own Your Network

By: Ron Lifinski, Cyber Security Researcher DNS Tunneling Most organizations have a firewall t... READ MORE

Kindra Cantrell image Kindra CantrellOctober 22, 2018

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse image

Threat Review: Bypassing and Evading Host-based Detection through .NET Binary Abuse

By: Daniel Bresler, CyOps Team Leader .NET binary abuse is not overly sophisticated, nor is... READ MORE

Kindra Cantrell image Kindra CantrellAugust 28, 2018

The Good & the Bad of the Cyber Hack - Part 1 image

The Good & the Bad of the Cyber Hack - Part 1

Black Hat, White Hat, Grey Hat. Good hackers and bad hackers. Bad hackers that become good (aka... READ MORE

Kindra Cantrell image Kindra CantrellMay 7, 2018

Machine Learning, Artificial Intelligence & Security image

Machine Learning, Artificial Intelligence & Security

Our lives are more and more Mister Robot, and the industries which surround our lives are incre... READ MORE

Kindra Cantrell image Kindra CantrellApril 29, 2018

BYOD & the Weakest Link image

BYOD & the Weakest Link

In an age of BYOD, far, far removed from the big and clunky mobile phones of the days of yore,... READ MORE

Kindra Cantrell image Kindra CantrellApril 16, 2018

The Evolution of the Attack Kill Chain image

The Evolution of the Attack Kill Chain

Born of Necessity - The Cyber Kill Chain Way back in 2011, Lockheed Martin introduced the cybe... READ MORE

Kindra Cantrell image Kindra CantrellApril 8, 2018

Can Big Data Ever Be Secure? image

Can Big Data Ever Be Secure?

Big Data makes for big headlines. We talk about everything from its applications – with more... READ MORE

Kindra Cantrell image Kindra CantrellApril 1, 2018

The Orbitz Attack & the Visibility Achilles Heel image

The Orbitz Attack & the Visibility Achilles Heel

You’ve Been Breached – Welcome to the Club “Your account information may have been com... READ MORE

Kindra Cantrell image Kindra CantrellMarch 25, 2018

The Italian Botnet Attacks image

The Italian Botnet Attacks

Cynet Detects the Mail Botnet That Has Been Hitting Italian Companies The Cynet 360 holistic... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 29, 2018

Stopping Hidden Threats: Fileless Attacks image

Stopping Hidden Threats: Fileless Attacks

Cybercrime never stands still. Online crooks are always looking for a new edge to make their at... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 24, 2018

Cynet’s Response to Uber’s Extortion Payment image

Cynet’s Response to Uber’s Extortion Payment

Yesterday Uber revealed that it has kept silent for more than a year about a massive data breac... READ MORE

Kindra Cantrell image Kindra CantrellNovember 22, 2017

How Cynet Stops CSV / DDE Injections image

How Cynet Stops CSV / DDE Injections

CSV/DDE injection attacks have recently popped back up in the cyber world, with Cynet researche... READ MORE

Kindra Cantrell image Kindra CantrellNovember 16, 2017

The Year of Ransomware image

The Year of Ransomware

Ransomware has dominated the cybersecurity landscape in 2017, with organizations of every size... READ MORE

Kindra Cantrell image Kindra CantrellNovember 9, 2017

2017: The Ransomware Nightmare image

2017: The Ransomware Nightmare

It’s Halloween today, a few days after the recent Bad Rabbit ransomware attack that impacted... READ MORE

Kindra Cantrell image Kindra CantrellOctober 31, 2017

A Technical View of Bad Rabbit: Blog Part 2 image

A Technical View of Bad Rabbit: Blog Part 2

A Technical View of Bad Rabbit: Blog Part 2 Here’s what we know about Bad Rabbit, the rans... READ MORE

Kindra Cantrell image Kindra CantrellOctober 25, 2017

Cynet Stopped Bad Rabbit: Blog Part 1 image

Cynet Stopped Bad Rabbit: Blog Part 1

What is being labeled as ransomware makes an appearance again, the latest in 2017's saga of att... READ MORE

Kindra Cantrell image Kindra CantrellOctober 25, 2017

New York's Strict New Cyber Regulations: Just the Beginning image

New York's Strict New Cyber Regulations: Just the Beginning

All eyes are on New York state as they institute the nation’s first of its kind cyber securit... READ MORE

Kindra Cantrell image Kindra CantrellSeptember 6, 2017

Multiple Security Vendors… A Recipe for Disaster image

Multiple Security Vendors… A Recipe for Disaster

By Yossi Geller The cyber arms race has led organizations to stock-pile security solutions t... READ MORE

Kindra Cantrell image Kindra CantrellAugust 22, 2017

The Black-and-White of Black & White Hat-ers image

The Black-and-White of Black & White Hat-ers

By Inbal Aharoni It’s late one evening and a group of penetration testers are gathered aro... READ MORE

Kindra Cantrell image Kindra CantrellAugust 10, 2017

Living the CISO’s Nightmare? Simplify Your Security image

Living the CISO’s Nightmare? Simplify Your Security

As if CISOs didn’t have enough to worry about. Threats and vulnerabilities are constantly evo... READ MORE

Kindra Cantrell image Kindra CantrellJuly 30, 2017

Healthcare Breaches – the Tip of the Cyber-Iceberg image

Healthcare Breaches – the Tip of the Cyber-Iceberg

By Yossi Geller When it comes to cybercrime and healthcare, we are witnessing the tip of the... READ MORE

Kindra Cantrell image Kindra CantrellJuly 23, 2017

Ransomware Attacks Show Importance of Complex Protective Measures image

Ransomware Attacks Show Importance of Complex Protective Measures

By Amir Geri Last Tuesday, the world experienced another massive attack on its way of life.... READ MORE

Kindra Cantrell image Kindra CantrellJuly 11, 2017

Ransomware is Getting Faster – Is Your Security Keeping Up? image

Ransomware is Getting Faster – Is Your Security Keeping Up?

By Yossi Geller The recent wave of ransomware may be the sparks of a cyber revolution that h... READ MORE

Kindra Cantrell image Kindra CantrellJuly 5, 2017

Petya or NotPetya - Cynet Stops It image

Petya or NotPetya - Cynet Stops It

The big conversation around the recent ransomware attacks has been - Petya or NotPetya? So we s... READ MORE

Kindra Cantrell image Kindra CantrellJune 29, 2017

A Technical Analysis of NotPetya image

A Technical Analysis of NotPetya

Unless you have been living under a rock, over the last couple days you probably heard a lot ab... READ MORE

Kindra Cantrell image Kindra CantrellJune 28, 2017

MS Patch is Not Enough - See Cynet Stop Petya image

MS Patch is Not Enough - See Cynet Stop Petya

If you thought you were safe because you patched Eternal Blue with Microsoft's MS17-010 patch,... READ MORE

Kindra Cantrell image Kindra CantrellJune 28, 2017

Are Law Firms the Next Victims of Ransomware Bad Guys? image

Are Law Firms the Next Victims of Ransomware Bad Guys?

[vc_row][vc_column][vc_column_text]Are Law Firms the Next Victims of Ransomware Bad Guys? La... READ MORE

Kindra Cantrell image Kindra CantrellJune 14, 2017

The IT Security Double Whammy image

The IT Security Double Whammy

The IT Security Double Whammy: a Lack of Cyber Security Professionals + Disjointed Security So... READ MORE

Kindra Cantrell image Kindra CantrellJune 6, 2017

Ransomware Breaks the Bank – Depending on How You Look at It image

Ransomware Breaks the Bank – Depending on How You Look at It

The noise over WannaCry has lowered from its fevered pitch as organizations around the globe ha... READ MORE

Kindra Cantrell image Kindra CantrellMay 18, 2017

Cynet 360 Stops WannaCry Ransomware image

Cynet 360 Stops WannaCry Ransomware

It's being called the world's biggest ransomware operation ever. The back-story is known to... READ MORE

Kindra Cantrell image Kindra CantrellMay 13, 2017

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers image

Critical Issue Opened Private Chats of Facebook Messenger Users Up to Attackers

An estimated 1.8-billion active monthly users trust Facebook to keep their accounts, user detai... READ MORE

Kindra Cantrell image Kindra CantrellDecember 13, 2016

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack image

‘SNAP’ - Millions of LG Smartphone Devices are Vulnerable to Phone Hijack

Overview BugSec and Cynet researchers discovered a severe security vulnerability in LG G3 smar... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 28, 2016

Vendors Say Not Worried About FireStorm image

Vendors Say Not Worried About FireStorm

Following our last blog post, vendors say they are not worried about the FireStorm vulnerabilit... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 13, 2016

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls image

FireStorm: Severe Security Flaw Discovered in Next Generation Firewalls

BugSec Group and Cynet discovered a severe vulnerability in Next Generation Firewalls. Head of... READ MORE

Kindra Cantrell image Kindra CantrellDecember 9, 2015

Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration image

Shelob Moonlight – Spinning a Larger Web From IcedID to CONTI, a Trojan and Ransomware collaboration

By Max Malyutin – Sr. Threat Researcher Introduction Cynet’s research and CyOps teams con... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 1, 2015

Ransomware Removal: Recovering Your Files and Cleaning Up Infected Systems image

Ransomware Removal: Recovering Your Files and Cleaning Up Infected Systems

What is Ransomware? Ransomware is malware that encrypts user data and makes it inaccessible to... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 1, 1970

Defense Evasion Techniques image

Defense Evasion Techniques

Last updated: November 1st, 2021 Written by: Ariel silver Analyzing, detecting, and preventin... READ MORE

Kindra Cantrell image Kindra CantrellJanuary 1, 1970