Eyal Aharoni

Cybercriminals are Industrious When Hacking Industries

 

Cybercriminals Have an Unhealthy Appetite for Medical Data

 

Academia Up for Grabs

Academia is Still a Preferred Target for Cyberattacks. In our blog post of June 6 last year, we wrote that although the attacks in the academic sector had received much less media attention than those in other sectors, academic institutions have been favorite targets of cybercriminals for over 3[...]

Cyberattack and the City

Smart cities have become a lucrative target for cyber attackers due to the increasing number of connected systems embedded throughout the smart city’s infrastructure. The numbers talk volumes - global investment in smart cities will reach $80bn in 2018, and is expected to reach $135bn by 2021[...]

OilRig Keeps On Cyber Drilling

  Iranian-based hacker group OilRig keeps cyber drilling, posing a persistent threat! In a previous post, we mentioned Advanced Persistent Threat attacks (APTs) that are waging ongoing sophisticated hacking attempts targeted e.g., certain countries or institutions. These kinds of attack are[...]

Why CIOs Embrace BAS Platforms For Investment Decisions?

According to security and analytics experts, companies worldwide have spent a combined $114b on security products (both hardware and software) and services last year. This figure is expected to exceed $140b by 2021. In 2017, the average cost of one data breach for organizations was $3.62 million[...]

Are You Ready for the Next Cyber-Attack?

Cyber-crooks are masters of crime constantly developing, testing and fine-tuning their techniques to mine valuable and sensitive information for their own profit. As such, cyber-attacks come in a wide range of shapes and forms. To illustrate, cyber-criminals use: Advanced Persistent Threat[...]

Immediate Threat: Remote Code Execution abusing SettingContent-ms can deliver malicious code

To keep on giving our customers the tools to boost their cybersecurity posture, our Cymulate Labs are constantly searching for new global attacks that can compromise organizations. By adding the latest in-the-wild detected threats, we keep our BAS platform up to date. That’s why one of the unique[...]

Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part III

In our first blogpost about MITRE’s ATT&CK™ framework, we explained what it exactly is and how it contributes to cybersecurity. In our second blogpost, we dove deeper into the various features. In this blogpost, the third and final one in this series, we will discuss the future of MITRE’s[...]

Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part II

In our first blog post, we explained what MITRE’s ATT&CK™ framework is and how it can assist with cyber security. In this blog post, we will have a closer look at how Cymulate’s BAS platform can utilize the ATT&CK framework to boost the security posture of organizations.