SPEAK WITH AN EXPERT

CyberProof Acquires Interpres Security

A Gartner distinguished vendor in Continuous Threat Exposure Management (CTEM) and Automated Security Control Assessments (ASCA).

Read More
 CyberProof, a UST company, and Interpres logos on a black background, showcasing their strength in cyber security.

Better Security, Together

Our worldwide security operations teams work closely with your enterprise security organization, collaborating to deliver better security together, to protect you today against tomorrow’s threats.

 invisible

AI In Action

CyberProof put AI into actionable insights, by augmenting security operations through AI powered virtual assistance to deliver better security, together services.

Cloud First Security

CyberProof is a cloud first security operations company, enabled through key cloud partners, to help deliver the most cutting edge security services to help protect your enterprise.

 invisible

Detect, Respond, Adapt – Everywhere

CyberProof’s MXDR platform powered by AI adapts the most complex evolving threat landscape, continuously aggregating threat intelligence and responding, identifying and mitigating risk within your enterprise.

SecOps & Risk mitigation

Tailored threat intelligence

CyberProof uses OSINT and threat intelligence feeds for visibility into threats.

Use case management

CyberProof’s adaptable playbooks address continuously evolving threats with updated strategies.

Advanced threat hunting & security operations

Professionals manage sophisticated networks, leveraging experience to counter advanced threats.

Advanced threat hunting

Professionals manage sophisticated networks, leveraging experience to counter advanced threats.

Incident response retainer

24/7 global SOC support ensures incident response with guaranteed SLA.

Incident response retainer

24/7 global SOC support ensures incident response with guaranteed SLA.

Data security

CyberProof develops recovery plans, restoring capabilities after a cyber incident.

Asset management and classification

Classify and manage enterprise assets, understanding risks and data sensitivity.

Manual & automated penetration testing

Non-destructive tests uncover potential exploits in assets and applications.

Security awareness & training

Mitigate security issues early with CyberProof’s training and awareness programs.

Application security (AppSec)

Rigorous security assessment for on-premise and cloud applications to ensure protection.

Identity & access management (IAM)

IAM manages user access, monitors for anomalies, ensuring security.

Cloud security posture management (CSPM)

Cloud First approach ensures compliance and security within cloud environments.

Security platform management

Managed service for SIEM, EDR, MXDR, and threat intelligence solutions.

Vulnerability management (VM)

Identify, assess, and mitigate security vulnerabilities through regular scanning.

Partners

HyperScaler Cloud Native SIEM
SIEM Platforms
EDR
VM
IT/IOT
Threat Intel
Breach & Attack
See all partners

“Today I have complete visibility into the entire environment, in real time”

Jamil Farshchi | Equifax CISO

Watch Video Testimonial

CyberProof Acquires Interpres Security

By leveraging and integrating the Interpres Security CTEM solution into its security services portfolio, CyberProof is able to continuously identify, assess, and prioritize risk while adapting defense services, like MDR, Vulnerability management and Use case management to address ever evolving threats. Take proactive steps to fortify your security today!

Schedule Assessment

Start the journey today

SPEAK WITH AN EXPERT

Case Studies

Retail
Retail

Retail Company Reduces Data Costs by 85% with SIEM Transformation

The client is a leading retailer with over 1,000 stores across the United States and Canada. They offer a wide range of products and services to both consumers and businesses. To streamline their security infrastructure, the company decided to consolidate under a single, trusted cloud vendor. As an existing Microsoft 365 user, they embraced Microsoft’s comprehensive security suite, aligning their security approach with the industry’s best cloud security solutions. 
Read more
Banking
Banking

90% increase in visibility after deploying Microsoft XDR with CyberProof

CyberProof worked together with Microsoft to provision and deploy the Microsoft XDR capability and integrate it with the client’s current Managed Detection & Response (MDR) service with CyberProof. This was done by leveraging the CyberProof Defense Center (CDC) platform, which supports collaborative, real-time security operations for all stakeholders through orchestration and smart automation.
Read more
Financial Services
Financial Services

Enterprise saves millions on data ingestion & storage following cloud migration.

CyberProof’s deployment for this client includes one of the first commercial deployments of the Microsoft Sentinel cloud SIEM solution, helping dramatically reduce the cost of log ingestion and storage as the client migrated to cloud-native security operations, leveraging Azure Data Explorer (ADX) together with the CyberProof Log Collection (CLC) tool.
Read more
Insurance
Insurance

SOC unification streamlines enterprise insurance company’s security & network monitoring operations.

The client is a large insurance carrier with offices in multiple locations. The client initially turned to CyberProof after having issues with their previous service vendor, who was providing security alerts but conducting no real triage.
Read more
Healthcare: Pharmaceuticals
Healthcare: Pharmaceuticals

Global medical devices company gains visibility and meets stringent compliance standards across global geos

The client is a leading European-based, global pharmaceutical company that offers advanced tests and systems for disease diagnosis, monitoring, and treatment guidance. Operating in over 100 countries with over 40,000 employees, they serve millions of customers worldwide in numerous research and production facilities.
Read more
Healthcare: Pharmaceuticals Dental
Healthcare: Pharmaceuticals Dental

Pharmaceutical organization significantly enhances threat detection and response times

The customer decided to enhance their cybersecurity capabilities by partnering with CyberProof, focusing on comprehensive and proactive protection measures. CyberProof’s deployment for this customer included a full suite of managed cybersecurity services tailored to meet their specific needs.
Read more
All case studies

Threat Alerts

Leaked Black Basta Ransomware Chat Logs

03-Mar-2025
Label: Ransomware
Threat Level: Medium

In February 2025, a major leak exposed over 200,000 internal messages from the Black Basta ransomware gang, revealing critical insights into their operations. The leak, shared by “ExploitWhispers,” highlights the group’s tactics, including the exploitation of high-severity vulnerabilities such as CVE-2019-19781 in Citrix NetScaler (CVSS 9.8), CVE-2021-34473 in Microsoft Exchange (CVSS 9.8), and CVE-2018-13379 in Fortinet FortiOS (CVSS 9.8). These CVEs have been actively targeted by Black Basta. Additionally, the discussions show that SMB misconfigurations, exposed RDP servers, and weak authentication mechanisms are routinely exploited, often relying on default VPN credentials or brute-forcing stolen credentials.

The leak also provides insights into the gang’s leadership and operations. Key figures, including “Tramp” (Oleg Nefedov), have been identified, and the group has focused on exploiting known vulnerabilities in critical infrastructure sectors. Black Basta’s use of malware droppers and reliance on social engineering tactics demonstrates their evolving attack methods. This information underscores the importance of patching known vulnerabilities, especially those actively exploited in the wild, to mitigate the risk of a breach.

Lumma and ACRStealer Employ Dead Drop Resolver for C2 Evasion

03-Mar-2025
Label: Malware
Threat Level: Medium

Security researchers have observed a new malware campaign distributing infostealers such as LummaC2 and ACRStealer under the guise of illegal programs like cracks and keygens. ACRStealer employs a Dead Drop Resolver (DDR) technique similar to Vidar and LummaC2, using a legitimate web platform as an intermediary command-and-control (C2) server. Threat actors encode the actual C2 domain in Base64 on a specific webpage, which the malware then accesses and parses to retrieve the real C2 address. This method allows the malware to communicate covertly and execute malicious activities. While Steam has previously been used as an intermediary C2, recent malware campaigns have shifted to leveraging Google Docs (Forms and Presentations) and Telegra.ph for this purpose.

ACRStealer continuously modifies the placement of C2 strings across various platforms, making detection difficult. Currently, these strings are inserted into the ‘summary’ field of certain web services, making them invisible in a standard web browser and only detectable in the page source. The malware constructs the actual C2 URL by combining the retrieved domain with a hardcoded UUID identifier, then downloads configuration data encrypted with Base64 and XOR.

The configuration file used to communicate with the C2 server contains sensitive data stolen from the infected system, including browser data, text files, cryptocurrency wallets, FTP credentials, chat applications, email clients, remote access tools, terminal programs, VPN configurations, password managers, databases, and browser extension plugins. Depending on its configuration, the malware compresses collected files into a ZIP archive before transmitting them to the C2 server.

Explore all

Awards

 Excellence Awards 2024 finalist banner for CyberProof, a UST company, showcasing diversity in security through Microsoft Security and the Microsoft Intelligent Security Association, with a focus on MDR and SIEM solutions.
 Forbes award
 mssp top 250 2024
 ISG Provider Lens 2024 Quadrant image showcasing Cybersecurity Solutions and Services. Managed Security Services - SOC and MDR (Midmarket). Recognized as Leader, U.S.
 ISG Provider Lens 2024 Quadrant: Cybersecurity – Solutions and Services, Strategic Security Services (Midmarket), with a focus on MSSP, Leader, U.S." proudly displayed at the top with a trophy icon in the bottom right corner.
 ISG Provider Lens 2024 Quadrant for Cybersecurity Solutions and Services highlights Technical Security Services (Midmarket), emphasizing MxDR capabilities, with a "Leader, U.S." designation and a trophy icon.
 Gold award badge for cybersecurity, highlighting "2024 Globee Awards Gold Winner" and featuring a globe design embraced by laurel branches. Celebrated in the realms of MSSP and SecOps, this accolade represents excellence in managing security operations worldwide.
 Globee Awards logo with "2024 Globee Awards Silver Winner in Cybersecurity" text below, recognizing excellence in SOC solutions.
 Microsoft Solutions Partner badge for Security, enhanced by SOC capabilities, features Cloud Security and Threat Protection.
 The Microsoft Intelligent Security Association member badge proudly displays the Microsoft Security logo along with a label certifying it as a "Microsoft Verified Managed XDR Solution," highlighting its integration with leading SIEM and MSSP technologies.
 Google Cloud Partner logo featuring a colorful cloud icon, seamlessly integrating elements of SecOps and MxDR.
 The Intertek logo, featuring a globe with a grid pattern alongside the text "ISO 27001 Certification," embodies trust and security. It integrates seamlessly with modern SecOps approaches to enhance compliance and SIEM efficiencies.
 A badge proudly displaying "SOC 2" and "A-LIGN," featuring a geometric logo above, a gradient line below, and seamlessly integrated with the latest MxDR innovations.
 AICPA SOC seal in shades of blue with text "aicpa.org/soc4so" and "SOC for Service Organizations | Service Organization," tailored for MSSP efficiency.
 Crest logo featuring icons for security, certification, and SecOps with a blue and teal color scheme.
 MSSP Alert logo with text: "The Top 250 MSPs, 2023 Edition" in red and white, celebrating excellence in the ever-evolving SecOps landscape.
 The logo for the 2023 Global InfoSec Awards winner from Cyber Defense Magazine features a circular design with text and subtly incorporates elements of SOC excellence.
 Logo of Cyper Tech Two featuring two concentric rings, symbolizing their cutting-edge SecOps solutions, with the website URL www.CyperTechTwo.com displayed below.
 Cyber Security Excellence Awards badge, labeled "Winner 2022" in the MDR category.
 Badge with text "Big Innovation 2022" surrounding a lightbulb icon, symbolizing groundbreaking ideas in fields like SecOps and MDR.
 2021 Global InfoSec Awards Winner badge from Cyber Defense Magazine for excellence in Adaptive Managed xDR.
 Cybersecurity Speakt

Resources

Explore resources

Start the journey today

SPEAK WITH AN EXPERT