SPEAK WITH AN EXPERT

Better Security, Together

Our worldwide security operations teams work closely with your enterprise security organization, collaborating to deliver better security together, to protect you today against tomorrow’s threats.

 invisible

AI In Action

CyberProof put AI into actionable insights, by augmenting security operations through AI powered virtual assistance to deliver better security, together services.

Cloud First Security

CyberProof is a cloud first security operations company, enabled through key cloud partners, to help deliver the most cutting edge security services to help protect your enterprise.

 invisible

Detect, Respond, Adapt – Everywhere

CyberProof’s MXDR platform powered by AI adapts the most complex evolving threat landscape, continuously aggregating threat intelligence and responding, identifying and mitigating risk within your enterprise.

SecOps & Risk mitigation

Tailored threat intelligence

CyberProof uses OSINT and threat intelligence feeds for visibility into threats.

Use case management

CyberProof’s adaptable playbooks address continuously evolving threats with updated strategies.

Advanced Threat Hunting & Security Operations

Professionals manage sophisticated networks, leveraging experience to counter advanced threats.

Advanced threat hunting

Professionals manage sophisticated networks, leveraging experience to counter advanced threats.

Incident response retainer

24/7 global SOC support ensures incident response with guaranteed SLA.

Incident Response Retainer

24/7 global SOC support ensures incident response with guaranteed SLA.

Data Security

CyberProof develops recovery plans, restoring capabilities after a cyber incident.

Asset Management and Classification

Classify and manage enterprise assets, understanding risks and data sensitivity.

Manual & Automated Penetration Testing.

Non-destructive tests uncover potential exploits in assets and applications.

Security Awareness & Training

Mitigate security issues early with CyberProof’s training and awareness programs.

Application Security (AppSec) Services

Rigorous security assessment for on-premise and cloud applications to ensure protection.

Identity & Access Management (IAM)

IAM manages user access, monitors for anomalies, ensuring security.

Cloud Security Posture Management (CSPM)

Cloud First approach ensures compliance and security within cloud environments.

Security Platform Management

Managed service for SIEM, EDR, MXDR, and threat intelligence solutions.

Vulnerability Management (VM)

Identify, assess, and mitigate security vulnerabilities through regular scanning.

Partners

HyperScaler Cloud Native SIEM
SIEM Platforms
EDR
VM
IT/IOT
Threat Intel
Breach & Attack
See all partners

Voice of the customer

Equifax

Watch Video

Case Studies

Banking
Banking

90% increase in visibility after deploying Microsoft XDR with CyberProof

CyberProof worked together with Microsoft to provision and deploy the Microsoft XDR capability and integrate it with the client’s current Managed Detection & Response (MDR) service with CyberProof. This was done by leveraging the CyberProof Defense Center (CDC) platform, which supports collaborative, real-time security operations for all stakeholders through orchestration and smart automation.
Read more
Financial Services
Financial Services

Enterprise saves millions on data ingestion & storage following cloud migration.

CyberProof’s deployment for this client includes one of the first commercial deployments of the Microsoft Sentinel cloud SIEM solution, helping dramatically reduce the cost of log ingestion and storage as the client migrated to cloud-native security operations, leveraging Azure Data Explorer (ADX) together with the CyberProof Log Collection (CLC) tool.
Read more
Logistics
Logistics

International logistics company sees 40% savings in security operations costs

CyberProof was selected to provide the client with a fully managed security event monitoring capability. Working together with Microsoft, one of our strategic partners, CyberProof developed a security analytics and SOC monitoring proposition – providing the client with the level of flexibility they required.
Read more
All case studies

Threat Alerts

Cybercriminals Exploit CrowdStrike Update to Launch Cyberattacks

22-Jul-2024
Label: Threat Advisory
Threat Level: Medium

Recently, an issue in a content update for the CrowdStrike Falcon sensor affecting Windows operating systems was discovered and quickly resolved. However, this incident has provided cybercriminals with multiple vectors to launch various cyberattacks, exploiting the confusion and urgency created by the update mishap.

Cybercriminals have leveraged the content update issue to distribute a malicious ZIP archive named crowdstrike-hotfix.zip. This archive contains a HijackLoader payload that, upon execution, uses DLL search-order hijacking to load and execute its first-stage payload. HijackLoader, marketed as a private crypting service called ASMCrypt, is a modular multi-stage loader designed to evade detection. Its configuration file provides data that the loader uses to execute the final RemCos payload, which then contacts a command-and-control (C&C) server.

In addition to the ZIP archive, several typosquatting domains impersonating CrowdStrike have been identified. These domains are used to trick users into downloading malicious files or redirect them to scam pages, including those requesting cryptocurrency payments under the pretense of providing a fix for the issue.

APT41’s Global Cyber Espionage Campaign

22-Jul-2024
Label: Malware
Threat Level: Medium

The China-based APT41 hacking group has launched a sustained campaign targeting organizations in the shipping, logistics, media, entertainment, technology, and automotive sectors across Italy, Spain, Taiwan, Thailand, Turkey, and the U.K. This campaign, ongoing since 2023, has allowed APT41 to maintain prolonged unauthorized access to victims’ networks, extracting sensitive data over extended periods.

The attack chain involves the use of web shells (ANTSWORD and BLUEBEAM), custom droppers (DUSTPAN and DUSTTRAP), and publicly available tools (SQLULDR2 and PINEGROVE). APT41 employs these tools to achieve persistence, deliver additional payloads, and exfiltrate data of interest. The DUSTTRAP malware, a multi-stage plugin framework, is particularly noteworthy for its extensive capabilities, including executing shell commands, file system operations, process manipulation, keylogging, and Active Directory modifications.

Further details, as well as YARA rules, can be found in the full report: https://cloud.google.com/blog/topics/threat-intelligence/apt41-arisen-from-dust

Explore all

Awards

 Cybersecurity Speakt

Start the journey today

SPEAK WITH AN EXPERT