CYREBRO Blog

REvil TOR sites back in action with new ransomware (RaaS) operations 

Has REvil re-emerged? That’s the question on everyone’s mind and the topic that’s got the cyber community talking. After months of silence, REvil, the infamous presumed Russian-based ransomware gang, seems to be back online as of last week, with a new leak site promoted on RuTOR. The hacker group’s old site, Happy Blog, has returned,…

  • Malicious NPM packages – an increasingly popular vector

    Malicious NPM packages – an increasingly popular vector

    Cybersecurity is a complicated circular pattern. Tools, strategies, and methodologies are constantly evolving to protect more expansive attack surfaces. At the same time, hackers develop new attack vectors at unprecedented rates. Round and round it goes with no end in sight.  Companies are often aware of massive cyberattacks that land in the headlines of major…

  • REvil TOR sites back in action with new ransomware (RaaS) operations 

    REvil TOR sites back in action with new ransomware (RaaS) operations 

    Has REvil re-emerged? That’s the question on everyone’s mind and the topic that’s got the cyber community talking. After months of silence, REvil, the infamous presumed Russian-based ransomware gang, seems to be back online as of last week, with a new leak site promoted on RuTOR. The hacker group’s old site, Happy Blog, has returned,…

  • The 7 Stages of a Ransomware Kill Chain 

    The 7 Stages of a Ransomware Kill Chain 

    In the first major battle of the America Civil War at Bull Run, nearby residents gathered on the hill overlooking where that battle was to take place with picnic baskets and opera glasses to witness the battle and cheer their side to victory. They ended up fleeing in terror. For those without any military experience,…

  • Improve your network security by eliminating blind spots 

    Improve your network security by eliminating blind spots 

    Spaghetti and meatballs. Batman and Robin. Peanut butter and jelly. Notice a theme? Well, here are two other pairs that go together as clearly as these, but you might be less familiar with: cybersecurity and visibility, and threat actors, and vulnerabilities. Cybersecurity threats are at an all-time high as threat actors are ruthless and willing…

  • Utilizing SOC Infrastructure vs Managed EDR – an MSSP perspective

    Utilizing SOC Infrastructure vs Managed EDR – an MSSP perspective

    The constant headlines concerning the latest attacks on companies across the industry spectrum serve as constant reminders of the importance of cybersecurity. Digital transformation alone is not enough. You must secure that digital environment, and it’s something that even SMBs have come to realize all too well. Unfortunately, most SMBs lack the technology stack, talent,…

  • Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel

    Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel

    SOCs are taking the center stage as the defenders of the network but many organizations don’t fully understand how to leverage a SOC, leaving them in the dark about the real value they provide.   On March 24, CYREBRO’s CEO and founder Nadav Arbel sat together with Ryan Alban Sr. Manager of Global Solution Leads at…

Loading

Sign Up for Updates