Information Security Blog
Cybercrimes are continually evolving. Make the Exabeam website and blog a regular source for your information security knowledge.
Stay ahead with Exabeam’s news, insights, innovations, and best practices covering information security and cyber threat detection and response for the security professional.
Or get our RSS feedRansomware’s Weakness: How to Turn Ransomware’s Achilles’ Heel Into the Defender’s Golden Hour
By Gorka Sadowski and Barry Shteiman, Exabeam Ransomware has an Achilles’ heel, yet few organizations are paying attention to the canary in the coal mine. Understanding normal versus abnormal behavior sheds light on the presence of ransomware performing reconnaissance before it strikes. This represents a great opportunity for defenders to get an early heads-up. In this post we’ll examine how organizations can leverage this knowledge. Ransomware is unfortunately here to stay. It took… Read more »

Browse by Categories





An Outcome-based Approach to Use Cases: Solving for Lateral Movement
March 23, 2021
Vicky Ngo-Lam

Ransomware’s Weakness: How to Turn Ransomware’s Achilles’ Heel Into the Defender’s Golden Hour
March 22, 2021
Gorka Sadowski

Zero-days Like HAFNIUM Attacks on Exchange Servers Are the New Norm: Why UEBA Matters More Than Ever
March 19, 2021
Marc Capellupo

Detecting Malicious Usage of Microsoft Binaries with Exabeam
March 17, 2021
Shubham Goel


Get the Latest on Information Security
We cover the latest in cyber security, data science, artificial intelligence, machine learning, User and Entity Behavior Analytics (UEBA), and next-gen SIEM. Make the Exabeam website and blog a regular source for your information security knowledge.
Or get our RSS feed