Fake Installer: Ultimately, ValleyRAT infection

In this Threat Analysis Report, Cybereason explores the fake installer, ValleyRAT

February 3, 2026 / 16 minute read

Identity & Beyond: 2026 Incident Response Predictions

DFIR expert Jamie Mamroe shares 2026 Incident Response Predictions around Identity and Cloud attacks

January 9, 2026 / 4 minute read

Cybereason Nails 100% Detection, Visibility, Accuracy and SOC Efficiency in the 2025 MITRE ATT&CK® Enterprise Evaluation

Cybereason achieves 100% detection, accuracy, and SOC efficiency in the 2025 MITRE ATT&CK Enterprise Evaluation.

December 16, 2025 / 3 minute read

CVE-2025-55182: Critical Vulnerability, React2Shell, Allows for Unauthenticated RCE

React2Shell vulnerability, tracked as CVE-2025-55182, recently discovered in React’s Server Components, could allow for pre-authentication remote code execution.

December 5, 2025 / 3 minute read

License to Encrypt: “The Gentlemen” Make Their Move

In this Threat Analysis Report, Cybereason explores the new ransomware group, "The Gentlemen", and their latest TTPs.

November 18, 2025 / 8 minute read

Tycoon 2FA Phishing Kit Analysis

In this Threat Alert, Cybereason analyzes Tycoon 2FA phishing kit, a sophisticated phishing-as-a-service platform designed to bypass two-factor authentication.

November 3, 2025 / 7 minute read

See All Posts

Malicious Life Series'

Research

Phorpiex - Downloader Delivering Ransomware

In this Threat Analysis report, Cybereason investigates the the Phorpiex botnet that delivers LockBit Black Ransomware (aka LockBit 3.0).

Read More

View All Research

Podcasts

Malicious Life Podcast: Operation Snow White, Part 2

Scientology spies were trained in all covert operations techniques: surveillance, recruiting agents, infiltrating enemy lines, and blackmail. However, a suspicious librarian and a determined FBI agent brought the largest single spy operation in US government history to an end.

Read More

View All Podcasts

Webinars

Webinar October 18th 2022: The True Cost of Ransomware - Evaluating Risk and How to Avoid Attacks

In this webinar, Cybereason CSO Sam Curry is joined by Cody Queen to dig into the data from the Ransomware: The True Cost to Business 2022 report and how to quantify the true cost to business of ransomware attacks and what cybersecurity leaders can do to mitigate against them...

Read More

View All Webinars

Resources

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Resources

Cybereason News

White Paper: Operation-Centric Security - Leveraging Indicators of Behavior for Early Detection

This paper details the Operation-Centric approach and how it can foster earlier detections based on Indicators of Behavior that empowers security operations to dynamically adapt and predictively respond more swiftly than attackers can modify their tactics to circumvent defenses...

Read More

View All Cybereason News

Webinar: Protecting Against IT Infrastructure Attacks from HAFNIUM to SolarWinds

Posted by Cybereason Team on Mar 22, 2021 11:52:58 AM
Cybereason Team

Attackers have proven time and again they are willing to innovate in nefarious ways to breach your defenses - as seen with the most recent headlines around the recent Microsoft Exchange and SolarWinds attacks.

Cyber attacks that target IT infrastructure systems are highly-scalable, campaign-style efforts with a widespread impact on operations for compromised organizations. These tactics are often state-sponsored, and with their high degree of success in recent months, we can expect this trend to continue into the future. Now is the time to learn how to end these attacks.

WEDNESDAY, MARCH 24TH
2:00 PM EST / 11:00 AM PDT
REGISTER HERE

THURSDAY, 25TH MARCH
2:00 PM GMT | 3:00 PM CET
REGISTER HERE

THURSDAY, 25TH MARCH
11:00 AM SGT
REGISTER HERE

Join our interactive sessions to learn, and see, more about:

                  • The emergence of infrastructure attacks

                    What is known to this point about the HAFNIUM attacks on Microsoft Exchange servers - who was targeted and what zero-day exploits were used

                    How to mitigate vulnerabilities and risks involved in the attack

                    Tips and tricks on how to create a “clean-slate” baseline that can detect and prevent sophisticated infrastructure attacks

                    Why Cybereason customers were fully protected against both Solarwinds and HAFNIUM

Speakers:

ISRAEL BARAK, CHIEF INFORMATION SECURITY OFFICER, CYBEREASON

israel barakIsrael Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.

JOHNNIE KONSTANTAS, GLOBAL VP CLOUD ENGINEERING, ORACLE

JOHNNIE KONSTANTASAs Global VP Cloud Engineering, Johnnie is responsible for the security value proposition of Oracle's Cloud Platform. She leads the development of go-to-market strategy, as well as field and customer evangelism and enablement.
She has spent more than 20 years bringing security products and technologies to market, most recently for Microsoft’s Enterprise Cybersecurity Group, and has PREVIOUSLY led product, business development, and marketing for security industry leaders including Gigamon, Juniper Networks, Varonis, and Check Point software.

Topics: Ransomware, Cybersecurity