blog_hero_02

Blog

10 Reasons to Budget for BAS in 2020
Dor Sarig, October 10, 2019
Read More >
‘Tis the season for budget planning. With 2019 coming to a close, you may be scrambling to put together a coherent proposal for 2020. And if you’re lucky, you may have some leftover budget that you need to spend wisely.   Focal Points for 2020 Budgets Analyst firm IDC forecasts a 10% increase in spending around security analytics and SIEM solutions, as well as more than a 10% increase in cyber threat intelligence. Automated continuous security testing, performed using breach and attack.
Read More >
What is Continuous Security Testing? Here are the Basics.
Mor Ahuvia, September 23, 2019
Read More >
Continuous security testing is the practice of challenging, measuring and optimizing the effectiveness of security controls on an ongoing basis, using automated testing tools, in order to continually identify new security gaps as they emerge, so they can quickly be fixed. Also called “security effectiveness testing,” the objective of continuous security testing is to find out how effective an organization’s current security controls are, uncover new security gaps as soon as they arise, and.
Read More >
Cymulate Launches *BAS for SMBs* to Increase Small Business Cyber Security
Mor Ahuvia, September 16, 2019
Read More >
Cymulate is proud to usher in a new age in the cyber security of small and midsized business (SMBs). With the launch of our new BAS for SMB bundles, it has never been simpler and more affordable to get your security posture up to par with the most security-mature enterprises. When it comes to cyber security, small and medium sized enterprises (SMEs) have it hard. Aware of their limited cyber security resources, threat actors specifically target them for their commercial accounts. According to.
Read More >
Immediate Threat Analysis – New Dharma Ransomware Strain Found in the Wild
Cymulate Research Lab, August 12, 2019
Read More >
Originally an offshoot of CrySiS, the Dharma ransomware family has brought forth a new variant, as part of its ongoing creation of new strains. In this blog post, we analyze the latest variant found in the wild by malware researcher Jakub Kroustek. Cymulate customers can check if they are vulnerable to this threat by running an Immediate Threat Intelligence simulation of this variant, uploaded to the dashboard on 28th July 2019. (Login to the dashboard here.) Overview Dharma has been operating.
Read More >
Red Teaming on Steroids - How to Optimize Security Controls Faster
Mor Ahuvia, July 19, 2019
Read More >
In the beginning there was pen testing. Then, developers accelerated pen testing with automated pentesting tools. Next, came the realization that instead of just one pen tester, a full team of pen testers could be deployed. Instead of seeking and exploiting security gaps opportunistically, they would perform reconnaissance work ahead of time, then plan and carry out a multi-step, multi-vector attack across the cyber kill chain, mimicking today’s sophisticated cyber heists and advanced.
Read More >
Threats that made Fireworks in the Headlines
Eyal Aharoni, July 4, 2019
Read More >
The lead up to this year’s 4th of July has been chockful of cyber events, from cities getting extorted, through triple-threat ransomware, to state-sponsored APT activity. Here’s a recap of last month’s cyber threat highlights. The month started with AMCA (an American billing collections service provider) announcing on June 3 that an unauthorized user had accessed its system containing personal information that AMCA had received from various entities. The personal data of 11.9 million customers,.
Read More >
4 Steps for Getting a Handle on Your Organization's Security Posture as a New CISO
Dor Sarig, March 21, 2019
Read More >
You just signed on as CISO. Congratulations. Now you can expect to be deluged with security emergencies and unresolved issues from your predecessor while you're getting to know and building credibility with your team. Meanwhile, cyberattackers are still pounding at the door. All of these immediate pressures are important, but optimizing organization-wide security is why you were hired. Here are four steps that will help you identify security priorities and appropriate remediation steps, so you.
Read More >
Seeing the Unseen: Detecting and Preventing the Advanced Persistent Threat
Eyal Aharoni, January 31, 2019
Read More >
In the last few years, APT attacks conducted by individual cybercriminals, organized crime and state-sponsored groups have become prevalent and sophisticated, bypassing standard security controls such as APT, or Advanced Persistent Threat, is a sophisticated attack in which a person or group attains access to a network and remains undetected for an extended period of time.   The DarkHydrus APT Attack Let’s have a closer look at how APT threat actors operate by looking at a recent APT attack,.
Read More >
The Top Cybersecurity Trends from 2018 and Predictions for 2019
Eyal Wachsman, November 19, 2018
Read More >
As this year is coming to a close, we look back at the year in review. In 2018, cybercriminals succeeded to carry out a larger number of cyberattacks and data breaches than any previous year.   The 6 Big Cyber Trends of 2018: Trend #1 – Email Attacks Remain Popular Trend #2 – Cryptojacking and Crypto Hijacking Trend #3 – Zero-Day and Fileless Attacks Trend #4 – Ransomware Keeps Paying Off Trend #5 – Verticals and Industries Remain Prime Targets Trend #6 – Law, Crime, and Punishment   In this.
Read More >
Unpatched vulnerabilities provide an open door for Cybercrooks
Eyal Aharoni, June 12, 2018
Read More >
Knock knock, whose there? A Cybercrook is exploiting known vulnerabilities to penetrate the organization for an easy picking. The 2018 Open Source Security and Risk Analysis report released by Black Duck Software (a developer of auditing software for open-source security) shows, that the patching of vulnerabilities still leaves much to be desired. The research found that 78% of the codebases examined contained at least one unpatched vulnerability, and an average of 64 known exploits per.
Read More >
Show

Subscribe to Our Blog

Stay up to date with the latest cybersecurity news and tips

By Tag