Today’s Cybersecurity Dilemma: Analyzing over 100,000 security incidents daily from more than 150 distinct threat actors
The Challenges:
- Security teams struggle to keep up with threats
- Uncertainty about relevant and significant threats
- Blind spots from ineffective, scattered cybersecurity tools
The Solution: Defend Against the Threats That Matter Most
CyberProof provides an integrated threat-led platform that combines:
- Estate (Asset) Management: Tag, classify, and prioritize known and unknown assets to understand your exposure – continuously
- Exposure Management: Focus on relevant threats using CTEM and ASCA frameworks – continuously
- Defense Management: Optimize detection and response playbooks – continuously
- Resulting in GRC Transformation: Mitigate Global Risk, Define Business Outcomes & ROI, Mature Security Posture
Partners
“Today I have complete visibility into the entire environment, in real time”
Jamil Farshchi | Equifax CISO
Recognised as industry leaders
Threat Alerts
AI-Powered Ransomware Emergence
Researchers have uncovered the first known AI-powered ransomware, dubbed PromptLock, marking a significant evolution in malware capabilities that leverages artificial intelligence to automate attack operations. The Golang-based malware utilizes OpenAI’s gpt-oss-20b model locally through the Ollama API to dynamically generate malicious Lua scripts for filesystem enumeration, data inspection, exfiltration, and encryption using the SPECK 128-bit algorithm across Windows, Linux, and macOS platforms. While currently identified as a proof-of-concept rather than active deployment, PromptLock demonstrates how publicly available AI tools can dramatically lower technical barriers for threat actors and enable ransomware operations to adapt and scale at unprecedented speeds. This development represents a concerning milestone in the convergence of artificial intelligence and cybercrime, potentially heralding a new generation of adaptive malware capable of real-time tactical modifications during attacks.
Docker Fixes Critical Container Escape Vulnerability CVE-2025-9074
Docker has released patches for a critical container escape vulnerability (CVE-2025-9074, CVSS 9.3) in Docker Desktop for Windows and macOS. The flaw allows a malicious container to access the Docker Engine API without authentication, enabling attackers to create and launch containers that mount the host filesystem. This can lead to full host compromise, including unauthorized access to sensitive files and privilege escalation.
Researchers demonstrated working proof-of-concept (PoC) exploits showing that simply sending crafted HTTP requests from inside a container could break isolation and take control of the host. On Windows, exploitation can grant attackers administrator privileges, allowing system-level DLL tampering. On macOS, the risk is somewhat reduced due to additional isolation layers and user prompts when mounting directories, but attackers can still modify Docker configurations and backdoor containers without user approval.