Cybersecurity Training US Cyber Range Map August 26, 2019 by arpit Whether you are a student looking for a college program that will give you the hands-on experience you need to launch a successful career; or a CISO that wants to guarantee the SOC team is ready to handle any cyber-attack quickly and effectively – find a US Cyber Range build on the world’s leading Cyberbit […] Read more » US Cyber Range
Cybersecurity Training Cyber Range Funding Sources: Federal and Private August 15, 2019 by arpit With skilled cybersecurity professionals in short supply, colleges and universities across the country are racing to create cybersecurity curriculum for students and industry professionals. Understanding how important it is for the U.S. to develop a skilled cybersecurity workforce, a variety of public and private entities are offering grants to help higher education institutions develop cybersecurity […] Read more » Cyber Range funding
Endpoint Security HawkEye Malware Changes Keylogging Technique August 13, 2019 by arpit Cyberbit Labs have observed HawkEye malware variants changed their keylogging technique. Until now, the most pervasive keylogger malware technique was to register a procedure into the message hook chain of a window using SetWindowsHookExA API. The new variants exploit RegisterRawInputDevices API to register for input from the keyboard. This technique is not a new one. […] Read more » Hawkeye Keylogging Malware
Security Operations Equifax Breach Cost is Much Higher than $700M August 4, 2019 by arpit The latest Equifax breach settlement figure is staggering. We aren’t accustomed to such large sums, but this is a new reality of costly data breaches is likely to become the norm. Both the public and private sectors have benefited enormously from the Internet technologies, and now the bills have begun to arrive, in the form […] Read more » Cost of Data Breach Equifax Breach
Cybersecurity Training Equifax Settlement Aftermath, 8 Questions for CISOs August 1, 2019 by arpit The Morning After the Equifax Settlement The recently announced Equifax Settlement has stirred up quite a bit of excitement. It’s not every day that a large financial organization is forced to pay out such a large sum, but there is actually nothing shocking about the $700M. Data breaches are costly. Unfortunately, they are also inevitable. […] Read more » Data Breach Equifax Settlement
Security Operations 2019 SANS Survey Highlights July 11, 2019 by arpit This year’s (2019) much-anticipated SANS Security Operations Center (SOC) Survey was just released and is an important read for security stakeholders of all levels and job descriptions. It’s also worth tuning into the webinar presenting the findings, or listening to the recording if you missed it live. The traditional SANS SOC survey provides objective data […] Read more » SANS SOC
Endpoint Security 3 Ways EDR Prevents Financial Cyberattacks June 23, 2019 by arpit Financial institutions are highly vulnerable to cyberattacks. According to Verizon’s 2019 Data Breach Investigations Reports, 10% of breaches were breaches of the Financial industry. Not only is the number of attacks increasing, but the attacks have become ever more sophisticated and targeted. As a result, regulatory bodies worldwide like the Reserve Bank of India (RBI) […] Read more » cyber attacks EDR Financial Services
Endpoint Security Formbook Research Hints Large Data Theft Attack Brewing June 12, 2019 by arpit In this blog post we will present the latest droppers of Formbook data stealing malware – an advanced malware that uses diverse and innovative techniques to evade security products. We will reverse engineer all the different droppers and suggest ways to detect them. We also show how Cyberbit EDR detects the latest Formbook dropper. Formbook […] Read more » droppers EDR Formbook malware
Endpoint Security Hawkeye Malware Analysis May 19, 2019 by arpit What is Hawkeye Malware? Hawkeye malware is a credential-stealing malware that is sold as a software-as-a-service. It uses keylogging to target the endpoint and a free tool, contained in an encrypted resource section of the binary to extract sensitive login data from web browsers. Hawkeye is a file-less attack that can often evade signature-based detection […] Read more » Hawkeye Malware