Play Demo

Automated Detection & Response Blog

github
Bank leaves sensitive data exposed on GitHub repositories
By Arie Fred, VP of Product, SecBI A North American bank stored highly sensitive digital property in a series of publicly open and accessible GitHub repositori...
cryptomining
Crypto mining- deep, dark and profitable
By Arie Fred, VP of Product, SecBI Crypto-mining (or crypto-jacking) malware campaigns climbed 29 percent from Q4 2018 to Q1 2019 according to a new study publ...
encryptoin
Encryption, a friend or foe of cybersecurity?
By Arie Fred, VP of Product, SecBI Encryption has been hailed as the savior of security and privacy online. Enterprises across the globe are increasingly adopt...
cyber defense
Where are your greatest threats coming from?: Inside or Outside?
By Ethan Milgram, Head of Sales, SecBI A recent report from Kaspersky Labs revealed that 90% of cybersecurity attacks are due to human error. That is a stagger...
AI
AI-based endpoint protection (EDR or AV) can be fooled a.k.a. our AI is bigger t...
By Arie Fred, VP of Product, SecBI Last week, security researchers announced to the world that they have managed to outsmar...
EDR
A Better View to Detect What EDRs Miss
By Arie Fred, VP of Product, SecBI Endpoint detection & response (EDR) security has been hailed by analysts and the industry alike as the “next big thing” ...
malware
Lucky number seven: Malware Detection after seven years
By Arie Fred, VP of Product, SecBI Several APT campaigns were in action for SEVEN years before being identified. Researchers from endpoint response detectio...
Slack
Slack as a C2 (Command and Control) Channel
By Arie Fred, VP of Product, SecBI As Slack, the popular messaging platform, went public, its stock prices soared, signaling investors’ confidence in this work...
cyberweek
How to Survive CyberWeek: A Complete Guide
By Sarah Mehlman, Marketing Manager, SecBI As Tel Aviv University’s cyberweek approaches, many cybersecurity experts are pr...
© 2021 SecBI Terms of Use Privacy