Fake Installer: Ultimately, ValleyRAT infection

In this Threat Analysis Report, Cybereason explores the fake installer, ValleyRAT

February 3, 2026 / 16 minute read

Identity & Beyond: 2026 Incident Response Predictions

DFIR expert Jamie Mamroe shares 2026 Incident Response Predictions around Identity and Cloud attacks

January 9, 2026 / 4 minute read

Cybereason Nails 100% Detection, Visibility, Accuracy and SOC Efficiency in the 2025 MITRE ATT&CK® Enterprise Evaluation

Cybereason achieves 100% detection, accuracy, and SOC efficiency in the 2025 MITRE ATT&CK Enterprise Evaluation.

December 16, 2025 / 3 minute read

CVE-2025-55182: Critical Vulnerability, React2Shell, Allows for Unauthenticated RCE

React2Shell vulnerability, tracked as CVE-2025-55182, recently discovered in React’s Server Components, could allow for pre-authentication remote code execution.

December 5, 2025 / 3 minute read

License to Encrypt: “The Gentlemen” Make Their Move

In this Threat Analysis Report, Cybereason explores the new ransomware group, "The Gentlemen", and their latest TTPs.

November 18, 2025 / 8 minute read

Tycoon 2FA Phishing Kit Analysis

In this Threat Alert, Cybereason analyzes Tycoon 2FA phishing kit, a sophisticated phishing-as-a-service platform designed to bypass two-factor authentication.

November 3, 2025 / 7 minute read

See All Posts

Malicious Life Series'

Research

Phorpiex - Downloader Delivering Ransomware

In this Threat Analysis report, Cybereason investigates the the Phorpiex botnet that delivers LockBit Black Ransomware (aka LockBit 3.0).

Read More

View All Research

Podcasts

Malicious Life Podcast: Operation Snow White, Part 2

Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end.

Read More

View All Podcasts

Webinars

Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks

In this webinar, Cybereason CSO Sam Curry is joined by Cody Queen to dig into the data from the Ransomware: The True Cost to Business 2022 report and how to quantify the true cost to business of ransomware attacks and what cybersecurity leaders can do to mitigate against them...

Read More

View All Webinars

Resources

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Resources

Cybereason News

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Cybereason News

Defender Spotlight: Keith Barros, Seton Hall University

Posted by Cybereason Team on Mar 2, 2021 9:00:00 AM
Cybereason Team

Top-tier defender Keith Barros of Seton Hall University discusses the successes SHU has achieved with a deployment of Cybereason solutions to secure endpoints and ramp-up students to Level1 Analyst level performance.

As the threat landscape evolves and becomes more complex, Seton Hall was a first-mover in adopting a solution that provides them with unmatched visibility, detection and contextualized response. 

Join us and our friend Keith Barros, Sr. Director Information Security and Service Management, to hear directly from the source about how the implementation of Cybereason has positively impacted their human security resources.

 

 

Specifically, Keith covers:

- Security challenges in the higher education space

- How SHU up-levelled students to defenders

- The role of a MalopTM in a modern cyber defense strategy

- From-the-field advice on reducing noise and FPs

- Additional ways Cybereason can secure today’s digital environments

For more details, check out the Seton Hall Customer Case Study here (PDF).

About Keith Barros, Senior Director of Information Security, SHU

keith-barrosKeith Barros (@barroske)has over 30 years of IT executive management and information security experience in numerous industries. He has led the cybersecurity initiatives at Seton Hall University for over 13 years. 

Along with overseeing the cyber security function at Seton Hall, Keith works alongside his academic colleagues to create a student security analyst program which has cyber security students work with Seton Hall’s cybersecurity professionals. 

Keith has also been an adjunct professor teaching graduate and undergraduate classes in technology. He has a B.S. in Management Science from Kean University and an M.B.A in Marketing from Seton Hall University.

Topics: Webinars, Insights