Automated Detection & Response Blog

Bank leaves sensitive data exposed on GitHub repositories
By Arie Fred, VP of Product, SecBI
A North American bank stored highly sensitive digital property in a series of publicly open and accessible GitHub repositori...

Crypto mining- deep, dark and profitable
By Arie Fred, VP of Product, SecBI
Crypto-mining (or crypto-jacking) malware campaigns climbed 29 percent from Q4 2018 to Q1 2019 according to a new study publ...

Encryption, a friend or foe of cybersecurity?
By Arie Fred, VP of Product, SecBI
Encryption has been hailed as the savior of security and privacy online. Enterprises across the globe are increasingly adopt...

Where are your greatest threats coming from?: Inside or Outside?
By Ethan Milgram, Head of Sales, SecBI
A recent report from Kaspersky Labs revealed that 90% of cybersecurity attacks are due to human error. That is a stagger...

AI-based endpoint protection (EDR or AV) can be fooled a.k.a. our AI is bigger t...
By Arie Fred, VP of Product, SecBI
Last week, security researchers announced to the world that they have managed to outsmar...

A Better View to Detect What EDRs Miss
By Arie Fred, VP of Product, SecBI
Endpoint detection & response (EDR) security has been hailed by analysts and the industry alike as the “next big thing” ...

Lucky number seven: Malware Detection after seven years
By Arie Fred, VP of Product, SecBI
Several APT campaigns were in action for SEVEN years before being identified.
Researchers from endpoint response detectio...

Slack as a C2 (Command and Control) Channel
By Arie Fred, VP of Product, SecBI
As Slack, the popular messaging platform, went public, its stock prices soared, signaling investors’ confidence in this work...

How to Survive CyberWeek: A Complete Guide
By Sarah Mehlman, Marketing Manager, SecBI
As Tel Aviv University’s cyberweek approaches, many cybersecurity experts are pr...