Carbon Black, Inc.
Follow
159 Followers
Follow Carbon Black, Inc. on their other social channels!
About Us
Founded:
2002
Company Size:
501-1000 employees
Company Type:
Private
Location:
Waltham, MA
Website:
Carbon Black is the leading provider of next-generation endpoint security. Carbon Black’s Next-Generation Antivirus (NGAV) solution, Cb Defense, leverages breakthrough prevention technology, “Streaming Prevention,” to instantly see and stop cyberattacks before they execute. Cb Defense uniquely ...
Read more
Promoted Content
15-Day Free Trial of NGAV + EDR in the Cloud
Follow
TAU Threat Intelligence Notification: LamePyre (OSX)
Summary  MalwareBytes researcher Adam Thomas recently discovered a malicious MacOS application masquerading as the chat app Discord that they have named “LamePyre.”  Although it is made to look like a typical application installer, it does not attempt to appear legitimate by running a decoy installer program. When executed, an Automator script is launched and no other indication is made to the user that anything is running other than the standard animated gear ico ...
Save
Like
01/11/2019
Follow
TAU Threat Intelligence Notification: Israbye Wiper
Summary Israbye is a disk wiper first discovered by a researcher in August 2017, as reported by Bleeping Computer. A newer sample has since been discovered, which appears to timely coincide with a recent news story that references the Al-Aqsa mosque. This mosque is also referenced within the malware note as shown below. Unlike the original sample discovered back in 2017, this sample includes Arabic as well as Korean wording, is not modular, and doesn’t contain any anti ...
Save
Like
01/11/2019
Follow
How CB LiveOps Helps with IT Hygiene
Security and IT Operations teams often have no reliable way to assess the current state of endpoints across their enterprise, leading to increased risk of breach, inability to make informed remediation decisions, and unnecessary spending on infrastructure maintenance.  A real-time endpoint query and remediation tool enables organizations to ask questions of all endpoints and take action to instantly remediate issues. This makes finding and remediating attacks or vulnerabilities a quick and ...
Save
Like
01/07/2019
Follow
TAU Threat Intelligence Notification: Djvuu Ransomware
Summary Djvuu ransomware is believed to be a newer variant of the “Stop” ransomware strain, which was seen circulating in the early part of 2018. There are also similarities to the Goren-B trojan originally reported by Sophos back in 2016. Djvuu is likely to be delivered through phishing e-mail campaigns such as Emotet, in the form of e-mail attachments or malicious links. When the dropped file is executed, the following files are placed into the following folder:  C:U ...
Save
Like
01/07/2019
Follow
Top 5 Threat Hunting Myths: “Threat Hunting Is Just a Fad”
The cybersecurity landscape is in a constant state of change and, as many organizations have learned, it’s no longer a matter of if you’ll face a cyberattack, but when. In today’s world, attackers intentionally look normal to evade automated defenses. With the rise of ransomware, fileless and non-malware attacks, it’s harder than ever to protect your endpoints with confidence.   To prevent this, threat hunting has emerged as an essential process for organization ...
Save
Like
01/04/2019
Follow
3 Infosec Reflections to Kick off 2019 & Finally Shift the Balance of Power Back to Defenders
Wow. It’s already 2019. Talk about a year in 2018 that flew by! I won’t spend this entire blog talking about 2018 but, needless to say, a lot happened in 2018 and it doesn’t look to slow down anytime soon. This time of year, I like to stop and reflect on the previous year and think about moving forward. I don’t actually make resolutions but rather reflect on things I could (and we as a community could) do better. This year we should all look to: Stop focusing on each othe ...
Save
Like
01/02/2019
Follow
CB Customer Spotlight: Q&A with Kaas Tailored’s Joe Mrazik
For the past eight years, Joe Mrazik has taken on the role of Network Administrator for Kaas Tailored, protecting the company’s endpoints with CB Defense. Kaas Tailored is an aerospace and furniture manufacturing company that supplies parts to aerospace companies like Boeing. Read on to learn how Joe and his team have saved time, effort and resources using CB Defense. Tell us about Kaas Tailored’s process for choosing Carbon Black. Prior to enlisting Carbon Black, we had a compromis ...
Save
Like
01/01/2019
Follow
Cybersecurity Skills Gap: “There’s No Silver Bullet to Solving the Problem” &
Last week, I ventured up to the beautiful city of Toronto — and while I’d love to go back for pleasure, this trip was strictly business. The Toronto Global Forum is an international conference that brings together heads of states, central bank governors, ministers and global economic decision makers, to examine national and global issues. The International Economic Forum of the Americas invited me to participate in the “Anticipating Cyber Risk” panel, alongside notable pr ...
Save
Like
12/21/2018
Follow
Untainted By Design: How Our MITRE ATT&CK Results Demonstrate the Resilience of Carbon Black
I started my career in cybersecurity 10 years ago as a Technical Operations Officer in the US Intelligence Community, where I had a first-hand view into the most sophisticated ongoing cyber operations in the world. One thing was always clear: attackers always found ways to stay a step ahead of the defenders. This is why Carbon Black’s approach to continuous recording of unfiltered data is so key. As the Senior Product Manager for CB ThreatHunter, I’m also ecstatic about our recent MI ...
Save
Like
12/20/2018
Follow
BLITZ! Like a Great Middle Linebacker, An Agile & Strong EDR Solution Can Quickly Respond to an
As we near the close of 2018, we should appreciate that cyberspace has become an increasingly hostile landscape. Geoplitical tensions are manifesting in cyberspace and cyber criminals have become increasingly punitive this year.  We at Carbon Black have observed some interesting trends: Vapor Worms Wipers deployed for counter incident response Island Hopping through cloud environments Watering Hole Attacks that employ destructive payloads Today’s adversary is intent on waging a cyber ...
Save
Like
12/19/2018

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel