CyberProof Research Team
Our Cyber Research Team is always on the lookout for the latest threats facing the digital ecosystem. Stay ahead of the risks so you don't need to find out about them after they become your next attackers.
HIPAA Compliance Made Easy: Automating Security Control Assessments
8 minute read
Insider Threats, AI and Social Engineering: The Triad of Modern Cybersecurity Threats
11 minute read
insider threat
Breach and Attack Simulation: Demonstrating Enterprise Security to the Board
9 minute read
How Banks Can Achieve PCI DSS Compliance with Google Chronicle SIEM
9 minute read
Google Chronicle SIEM
Why Enterprises Are Choosing Google Cloud Security to Strengthen Defense
9 minute read
Google Cloud Security
Why High-Net-Worth Individuals Need Tailored Threat Intelligence Services
8 minute read
How AI-driven data security is Redefining Risk-Based Protection and Threat Mitigation
10 minute read
AI-driven data security
Why Law Firms Are Prime Targets for Cyber Attacks And How to Stay Secure
9 minute read
AI-Powered Fraud Detection: How Banks Can Stop Cyber Threats and Cybercriminals in Real Time
10 minute read
Cyber threat intelligence
CyberProof 2025 Global Threat Intelligence Report: Mapping Threats and Trends
3 minute read
CTI
Risks tied to SimpleHelp Remote Monitoring & Management Exploitation
4 minute read
Threat Hunting
The Role of Continuous Threat Exposure Management in Cybersecurity
7 minute read
Continuous Threat Exposure Management
10 Must-Know Insights About Continuous Automated Red Teaming (CART)
8 minute read
CART
Top 5 Cybersecurity Concerns for Enterprises in 2025
8 minute read
Cybersecurity
Why Vulnerability Assessment is Essential for Businesses
9 minute read
SIEM
Coyote Banking Trojan Extends Reach & Targets Users through WhatsApp
7 minute read
Malware
The Future of AI Data Security: Trends to Watch in 2025
8 minute read
AI Data Security
Breaking Down Black Basta’s Advanced Phishing Strategies
9 minute read
Threat Research
Minimize Downtime: How to Build a Cyber Resilient Business
8 minute read
The Dangers of Insecure IoT: How to Protect Yourself from IoT Attacks
8 minute read
IoT Attacks
Don’t Miss the Signs: How to Effectively Detect and Respond to Cyber Threats
8 minute read
cyber threats
Reduce Your Cyber Attack Surface: How Threat Intelligence Can Help
8 minute read
cyber attack
How MITRE ATT&CK Helps In Improving Your Cyber Defense
8 minute read
MITRE ATTACK
Minimize Cloud Risks: Essential Cloud Security Monitoring Tools and Techniques
9 minute read
Cybersecurity
How Security Visibility Empowers Your Defense
9 minute read
Security Operations
Stop OT Disruptions: 5 Ways to Improve Your Operational Technology Security
9 minute read
OT Security
AI Data Security: Key Threats and Protection
12 minute read
Data Security
CyberProof Acquires Interpres Security to Revolutionize Continuous Threat Exposure Management
7 minute read
Proactive SecOps for financial organizations in 2025
5 minute read
BFSI
What is CTEM?
12 minute read
CTEM
A Guide to the Windows BSOD Crisis, Following CrowdStrike’s Update
2 minute read
Microsoft
Palo Alto QRadar Acquisition: Impacts on Cloud-Native SIEMs
7 minute read
AI
CyberProof announces strategic partnership with Google Cloud
4 minute read
Targeted Threat Intelligence: Turning Challenges to Opportunities
7 minute read
Cyberattack
Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022
4 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022
7 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022
3 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022
4 minute read
Cyber Warfare
Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day
2 minute read
Cyber Alerts
Holiday Season Cyber Threats
7 minute read
Faced with New Threats, Healthcare Providers Focus on Cyber Security
7 minute read
Threat Research
7 Insights on SolarWinds SUNBURST – the “Cyber Pearl Harbor”
5 minute read
Threat Research
Identifying Spear Phishing Attacks – What Remote Workers Need to Know
5 minute read
Threat Research
Cyber Criminals Target IT Services Company Using Maze Ransomware
6 minute read
Ransomware
Hackers Use Widespread Zoom Mode to Increase Attacks
3 minute read
Cyber Alerts
A New Cyber Security Threat – Hackers Take Advantage of Coronavirus
3 minute read
Threat Research
Artificial Intelligence and Threat Intelligence: Better Together
5 minute read
Threat Intelligence
CyberProof Research Team Detects Multiple DDoS Attacks
3 minute read
Threat Research
4 Steps to Protect Your Privacy During an Online Investigation
5 minute read
WSH RAT is leaked on a Deep Web Forum – for Free
3 minute read