Erkang Zheng is the CISO of LifeOmic and the General Manager of JupiterOne.
One of the key challenges facing growing cloud-native organizations is the ability to maintain your security and compliance posture despite your employees’ access to
SEON Ransomware ver 0.2 was found being distributed by the GreenFlash Sundown exploit kit via a drive-by-attack campaign. After performing the encryption, SEON will drop and display the following ransom note and append ‘.fixt’ as the extension
An early Carbon Black customer and Red Canary detection engineer provides perspective on Carbon Black’s technology evolutions.
This post was originally published by our partner Red Canary on May 30, 2019.
Back in 2013, I was one of the first
What are Living Off the Land (LoL) Attacks?
In recent years, Living off the Land Binaries and Scripts (LOLBas) have become increasingly popular tools for cybercriminals. These types of attacks leverage native, signed, and often pre-installed
Today we’re excited to announce Linux support for CB LiveOps, Carbon Black’s real-time endpoint query & remediation solution that helps security teams audit and change the state of their systems. This release expands the product’s footprint
Peter Silberman is the Director of Detection & Response, Innovation at Expel. Mary Singh is a Detection and Response Lead at Expel.
So, you want to build a threat hunting program…but where do you start?
There are lots of ways to build a
RISK 2019 Serbia took place on the 29th of May 2019 at the Radisson Collection Old Mill Belgrade hotel, where IT security specialists could meet, network, educate and of course, have fun. Watch the recap video below and all videos on demand from
Ryan Stolte is the co-founder and CTO for Bay Dynamics.
There are clearly many reasons why Endpoint Detection and Response (EDR) has materialized into such a hotbed of interest, investment and emerging best practices – endpoint security must
Danabot is a banking trojan written in the Delphi programming language. Delivery methods are typically via phishing emails that contain malicious attachments, which further call out to download the main payload using PowerShell or
Enterprises of all sizes face a massive challenge when it comes to IoT security.
With so many business operations reliant on technology, there can be vulnerabilities hiding in a multitude of places. Security teams, especially those who work in