blog_hero_02

Blog

Academia Up for Grabs
Eyal Aharoni, September 4, 2018
Read More >
Academia is Still a Preferred Target for Cyberattacks. In our blog post of June 6 last year, we wrote that although the attacks in the academic sector had received much less media attention than those in other sectors, academic institutions have been favorite targets of cybercriminals for over 3 decades. We also mentioned that those attacks are not likely to go away. Sadly enough, this has proved to be true. Date Target Attack Result March 2018 140 American research universities.
Read More >
Cyberattack and the City
Eyal Aharoni, August 28, 2018
Read More >
Smart cities have become a lucrative target for cyber attackers due to the increasing number of connected systems embedded throughout the smart city’s infrastructure. The numbers talk volumes - global investment in smart cities will reach $80bn in 2018, and is expected to reach $135bn by 2021 (Source: IDC’s Smart cities spending guide) For smart threat actors, it’s quite easy to take control of the smart lighting system of Barcelona (which uses sensors to collect air quality data) or New York’s.
Read More >
OilRig Keeps On Cyber Drilling
Eyal Aharoni, July 30, 2018
Read More >
  Iranian-based hacker group OilRig keeps cyber drilling, posing a persistent threat! In a previous post, we mentioned Advanced Persistent Threat attacks (APTs) that are waging ongoing sophisticated hacking attempts targeted e.g., certain countries or institutions. These kinds of attack are especially popular with rogue regimes such as North Korea and Iran. The latter uses those to bring cyberwarfare to a whole new level, with Iranian hacker group OilRig (also known as PT34 or Helix Kitten).
Read More >
Why CIOs Embrace BAS Platforms For Investment Decisions?
Eyal Aharoni, July 12, 2018
Read More >
According to security and analytics experts, companies worldwide have spent a combined $114b on security products (both hardware and software) and services last year. This figure is expected to exceed $140b by 2021. In 2017, the average cost of one data breach for organizations was $3.62 million and 66% of respondents believe data breaches or cyber-security exploits will seriously diminish their organization’s shareholder value. Organizations are making protection of customer data and.
Read More >
Are You Ready for the Next Cyber-Attack?
Eyal Aharoni, July 9, 2018
Read More >
Cyber-crooks are masters of crime constantly developing, testing and fine-tuning their techniques to mine valuable and sensitive information for their own profit. As such, cyber-attacks come in a wide range of shapes and forms. To illustrate, cyber-criminals use: Advanced Persistent Threat attacks (or APT in short) waging ongoing sophisticated hacking attempts targeted a person, business, or country; phishing attacks (including spear phishing an whaling) to steal sensitive information; .
Read More >
Immediate Threat: Remote Code Execution abusing SettingContent-ms can deliver malicious code
Eyal Aharoni, July 5, 2018
Read More >
To keep on giving our customers the tools to boost their cybersecurity posture, our Cymulate Labs are constantly searching for new global attacks that can compromise organizations. By adding the latest in-the-wild detected threats, we keep our BAS platform up to date. That’s why one of the unique (and highly popular) features in our platform is the Immediate Threat assessment, which allows organizations to test themselves their vulnerability head-on those latest threats within just few hours. .
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part III
Eyal Aharoni, July 3, 2018
Read More >
In our first blogpost about MITRE’s ATT&CK™ framework, we explained what it exactly is and how it contributes to cybersecurity. In our second blogpost, we dove deeper into the various features. In this blogpost, the third and final one in this series, we will discuss the future of MITRE’s ATT&CK™ framework as we see it. To recap: ATT&CK™ is a MITRE-developed, globally-accessible knowledge base of cyberattack strategies and techniques that have been detected and reported. This knowledge base is.
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part II
Eyal Aharoni, June 28, 2018
Read More >
In our first blog post, we explained what MITRE’s ATT&CK™ framework is and how it can assist with cyber security. In this blog post, we will have a closer look at how Cymulate’s BAS platform can utilize the ATT&CK framework to boost the security posture of organizations. In general, MITRE’s ATT&CK™ and Cymulate’s BAS platform are perfectly in sync, which is good news for organizations and bad news for cybercrooks. Cymulate covers all Tactics and Techniques of MITRE’s ATT&CK™ matrix an.
Read More >
Demystifying MITRE’s ATT&CK™ to supercharge cyber defenses - Part I
Eyal Aharoni, June 21, 2018
Read More >
Ransomware is on the rise, massive data breaches are announced with scary regularity, and APTs continue to nestle themselves in networks going completely undetected for months and sometimes even years.  Although organizations across all industries keep on increasing their cybersecurity budgets and hiring more staff, these measures are still not sufficient and effective enough. Lately, there has been a lot of noise around ATT&CK™, the Adversarial Tactics, Techniques, and Common Knowledge base.
Read More >
Unpatched vulnerabilities provide an open door for Cybercrooks
Eyal Aharoni, June 12, 2018
Read More >
Knock knock, whose there? A Cybercrook is exploiting known vulnerabilities to penetrate the organization for an easy picking. The 2018 Open Source Security and Risk Analysis report released by Black Duck Software (a developer of auditing software for open-source security) shows, that the patching of vulnerabilities still leaves much to be desired. The research found that 78% of the codebases examined contained at least one unpatched vulnerability, and an average of 64 known exploits per.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag