Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

CyberReason

Below you will find reports with the source of “CyberReason”

image from The Year Of The Defender

The Year Of The Defender

From the report, “What does 2018 hold in store for the defenders? Unfortunately, more of the same security drama, according to Cybereason’s researchers and analysts. (more available)
Added: February 8, 2019
image from A Large Scale Cyber Espionage APT in Asia

A Large Scale Cyber Espionage APT in Asia

The investigation of a massive cyber espionage APT (Advanced Persistent Threat) became a game of one-upmanship between attackers and defenders. Dubbed Operation Cobalt Kitty, the APT targeted a global corporation based in Asia with the goal of stealing proprietary business information. (more available)
Added: November 15, 2018
image from Operation Cobalt Kitty

Operation Cobalt Kitty

This report offers a threat actor profile and indicators of compromise around the OceanLotusGroup actor.
Added: November 15, 2018
image from When Next-Gen AV Meets EDR: Overpowering Advanced Threats

When Next-Gen AV Meets EDR: Overpowering Advanced Threats

Overpowering today’s attackers and responding to threats requires EDR plus NGAV. The bad guys treat all of an organization’s machines as possible entry points. (more available)
Added: October 24, 2018
image from The IR Boost: How Threat Hunting Enhances Incident Response

The IR Boost: How Threat Hunting Enhances Incident Response

Whether it’s referred to as threat hunting or hunt teaming, companies are increasingly taking a proactive approach to security by looking for evidence of threats that are already in their environments. (more available)
Added: October 23, 2018
image from CISO Tips: Balancing the hero with the storyteller

CISO Tips: Balancing the hero with the storyteller

There’s no clear and direct career path to the role of infosec executive. But, there are skills that can help you advance your career to the management level, such as deep technical knowledge, strong communication skills and having business acumen. (more available)
Added: October 22, 2018
image from The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

The Defender’s Advantage: Using the Attack Lifecycle to Detect TTPs

Don’t let Hollywood fool you: carrying out an attack doesn’t resemble the plot of an action movie. Attackers don’t automatically breach a network, immediately locate the information they want and then swiftly exit the organization. (more available)
Added: October 18, 2018
image from CISO Tips: Speaking the language of business

CISO Tips: Speaking the language of business

What’s not open to discussion is that the role of information security executives has evolved. CISOs may now find themselves talking to investors about how an attack impacted quarterly earnings in addition to more traditional duties like managing a SOC. (more available)
Added: October 17, 2018
© Cyentia Institute 2021
Library updated: March 6, 2021 12:08 UTC (build 7e736b2)