Fake Installer: Ultimately, ValleyRAT infection

In this Threat Analysis Report, Cybereason explores the fake installer, ValleyRAT

February 3, 2026 / 16 minute read

Identity & Beyond: 2026 Incident Response Predictions

DFIR expert Jamie Mamroe shares 2026 Incident Response Predictions around Identity and Cloud attacks

January 9, 2026 / 4 minute read

Cybereason Nails 100% Detection, Visibility, Accuracy and SOC Efficiency in the 2025 MITRE ATT&CK® Enterprise Evaluation

Cybereason achieves 100% detection, accuracy, and SOC efficiency in the 2025 MITRE ATT&CK Enterprise Evaluation.

December 16, 2025 / 3 minute read

CVE-2025-55182: Critical Vulnerability, React2Shell, Allows for Unauthenticated RCE

React2Shell vulnerability, tracked as CVE-2025-55182, recently discovered in React’s Server Components, could allow for pre-authentication remote code execution.

December 5, 2025 / 3 minute read

License to Encrypt: “The Gentlemen” Make Their Move

In this Threat Analysis Report, Cybereason explores the new ransomware group, "The Gentlemen", and their latest TTPs.

November 18, 2025 / 8 minute read

Tycoon 2FA Phishing Kit Analysis

In this Threat Alert, Cybereason analyzes Tycoon 2FA phishing kit, a sophisticated phishing-as-a-service platform designed to bypass two-factor authentication.

November 3, 2025 / 7 minute read

See All Posts

Malicious Life Series'

Research

Phorpiex - Downloader Delivering Ransomware

In this Threat Analysis report, Cybereason investigates the the Phorpiex botnet that delivers LockBit Black Ransomware (aka LockBit 3.0).

Read More

View All Research

Podcasts

Malicious Life Podcast: Operation Snow White, Part 2

Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end.

Read More

View All Podcasts

Webinars

Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks

In this webinar, Cybereason CSO Sam Curry is joined by Cody Queen to dig into the data from the Ransomware: The True Cost to Business 2022 report and how to quantify the true cost to business of ransomware attacks and what cybersecurity leaders can do to mitigate against them...

Read More

View All Webinars

Resources

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Resources

Cybereason News

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Cybereason News

Is XDR the Next Silver Bullet?

Posted by Cybereason Team on Dec 4, 2020 4:05:00 PM
Cybereason Team

Join us for an hour-long panel on the intricacies of XDR and how it will affect the security industry. Learn what XDR is, specific use cases, and how security practitioners can easily integrate this new technology into their security stack.

WEDNESDAY, DECEMBER 9TH at 11:00 AM (EDT) | 4:00 PM (BST)

REGISTER HERE

Our guest panel includes experts from the security industry, with special guest Mike Rothman, Sam Curry, and Yonatan Striem-Amit. In this session, you will learn:

• If XDR really is the silver bullet we’ve been told

• What to keep in mind when looking at XDR solutions

• What the tradeoffs are when implementing XDR

• What comes next after XDR

  •  

Panelists

MIKE ROTHMAN, ANALYST & PRESIDENT, SECUROSIS

mike-rothman-hex-hsMike Rothman’s bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape. 

Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis.

YONATAN STRIEM-AMIT, CTO & CO-FOUNDER, CYBEREASON

yonaton-hex-hsYonatan Striem-Amit is a machine learning, big data analytics, reverse engineering and cyber security expert, with over a decade of experience building highly sophisticated custom solutions to cyber for governmental agencies. Prior to founding Cybereason, Yonatan headed the development for Watchdox, a leading DRM and SaaS security startup.

SAM CURRY, CSO, CYBEREASON

sam-hex-hsSam Curry has over 25 years of IT security industry experience and is a Visiting Fellow at the National Security Institute. Sam most recently served as CTO, CSO and GM at Arbor Networks. 

Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management roles, including CTO, SVP of Product and Head of RSA Labs. In addition to other media. Sam has also held senior management roles at Microstrategy, Computer Associates, and McAfee in addition to co-founder and first employee of two successful security startups.

MODERATOR | ALLIE MELLEN, SECURITY STRATEGIST, CYBEREASON

allie-hex-hsAllie Mellen writes about security at Cybereason. She has several years of experience in cybersecurity and has been recognized globally for her security research. She has a B.S. degree in Computer Engineering and has had various engineering, development, and consulting roles in the technology sector over the past ten years.

Topics: Webinars, Insights