In this Threat Analysis Report, Cybereason explores the fake installer, ValleyRAT
February 3, 2026 / 16 minute read
In this Threat Analysis Report, Cybereason explores the fake installer, ValleyRAT
February 3, 2026 / 16 minute read
DFIR expert Jamie Mamroe shares 2026 Incident Response Predictions around Identity and Cloud attacks
January 9, 2026 / 4 minute read
Cybereason achieves 100% detection, accuracy, and SOC efficiency in the 2025 MITRE ATT&CK Enterprise Evaluation.
December 16, 2025 / 3 minute read
React2Shell vulnerability, tracked as CVE-2025-55182, recently discovered in React’s Server Components, could allow for pre-authentication remote code execution.
December 5, 2025 / 3 minute read
In this Threat Analysis Report, Cybereason explores the new ransomware group, "The Gentlemen", and their latest TTPs.
November 18, 2025 / 8 minute read
In this Threat Alert, Cybereason analyzes Tycoon 2FA phishing kit, a sophisticated phishing-as-a-service platform designed to bypass two-factor authentication.
November 3, 2025 / 7 minute read
In this Threat Analysis report, Cybereason investigates the the Phorpiex botnet that delivers LockBit Black Ransomware (aka LockBit 3.0).
View All ResearchScientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end.
View All PodcastsIn this webinar, Cybereason CSO Sam Curry is joined by Cody Queen to dig into the data from the Ransomware: The True Cost to Business 2022 report and how to quantify the true cost to business of ransomware attacks and what cybersecurity leaders can do to mitigate against them...
View All WebinarsThis paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...
View All ResourcesThis paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...
View All Cybereason NewsJoin us for an hour-long panel on the intricacies of XDR and how it will affect the security industry. Learn what XDR is, specific use cases, and how security practitioners can easily integrate this new technology into their security stack.
WEDNESDAY, DECEMBER 9TH at 11:00 AM (EDT) | 4:00 PM (BST)
Our guest panel includes experts from the security industry, with special guest Mike Rothman, Sam Curry, and Yonatan Striem-Amit. In this session, you will learn:
• If XDR really is the silver bullet we’ve been told
• What to keep in mind when looking at XDR solutions
• What the tradeoffs are when implementing XDR
• What comes next after XDR
Mike Rothman’s bold perspectives and irreverent style are invaluable as companies determine effective strategies to grapple with the dynamic security threatscape.
Mike specializes in the sexy aspects of security, like protecting networks and endpoints, security management, and compliance. He also possesses a very expensive engineering degree in Operations Research and Industrial Engineering from Cornell University. His folks are overjoyed that he uses literally zero percent of his education on a daily basis.
Yonatan Striem-Amit is a machine learning, big data analytics, reverse engineering and cyber security expert, with over a decade of experience building highly sophisticated custom solutions to cyber for governmental agencies. Prior to founding Cybereason, Yonatan headed the development for Watchdox, a leading DRM and SaaS security startup.
Sam Curry has over 25 years of IT security industry experience and is a Visiting Fellow at the National Security Institute. Sam most recently served as CTO, CSO and GM at Arbor Networks.
Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management roles, including CTO, SVP of Product and Head of RSA Labs. In addition to other media. Sam has also held senior management roles at Microstrategy, Computer Associates, and McAfee in addition to co-founder and first employee of two successful security startups.
Allie Mellen writes about security at Cybereason. She has several years of experience in cybersecurity and has been recognized globally for her security research. She has a B.S. degree in Computer Engineering and has had various engineering, development, and consulting roles in the technology sector over the past ten years.