Cyber Hub

Your Place for the Latest CyberProof Updates
Latest Reports RSS
  • 19-Oct-2021

    Microsoft HiveNightmare Vulnerability

    Tags: CVE , HiveNightmare , Hunt , Microsoft , SAM , SeriousSAM , Threat Hunting , Vulnerability
    Label: Threat Advisory
    Threat Level: High

    Recently, researchers discovered a new vulnerability in the Windows SAM database called HiveNightmare (aka SeriousSAM). Exploitation of this vulnerability could allow non-admin users to access the SAM database, which is a storage of local passwords and users. Essentially, an attacker could run arbitrary code with SYSTEM privileges, and then install programs; view, change, or delete data - or create new accounts with full admin rights. The vulnerability affects Windows 10 version 1809 and newer operating systems. Additionally, an exploit is publicly available. After this discovery, Microsoft addressed the vulnerability and assigned it the following CVE ID: CVE-2021-36934. Microsoft has not yet published an official patch for the vulnerability; however, several mitigations and workarounds are suggested.

    Read the full Threat Hunting report to learn more.

    Read More >
  • 19-Oct-2021

    BazarLoader to Conti Ransomware

    Tags: Backdoor , BazarLoader , Cobalt-Strike , Conti , Hunt , Phishing , Ransomware , Threat Hunting
    Label: Threat Advisory
    Threat Level: High

    BazarLoader is known to spread via phishing emails that purport to stem from legitimate sources. For instance, a malicious email could be disguised as payroll reports or lists of terminated employees. Clicking on the malicious link to documents can redirect the targeted victim to malicious landing pages resembling Excel sheets, PDFs, or Word documents. BazarLoader has continued to be one of the preeminent initial access brokers for ransomware threat actor access. In July, we witnessed a BazarLoader campaign that deployed Cobalt Strike and ended with domain-wide encryption using Conti ransomware.

    Read the full Threat Hunting report to learn more.

    Read More >
  • 18-Oct-2021

    Latest Reports on Recent Malware Campaigns

    Tags: Ad_Blocker , Ad_Injection , AllBlock , cryptominer , Google_Chrome , Keksec , Macros , Malware , MirrorBlast , Phishing , Python , REBOL , Spytech_Necro , TA505 , Vulnerability
    Label: Threat Advisory
    Threat Level: High

    This week, security researchers published a report explaining the technique that allowed the MyKings botnet to become the world's largest botnet dedicated to mining crypto currencies. In addition, a new Python-based malware attributed to Keksec has been analyzed. The malware has several vulnerability exploits in its arsenal, including an exploit of the recently disclosed Confluence RCE vulnerability. Also, a new campaign named MirrorBlast - linked to the threat actor TA505 - was discovered targeting mainly financial institutions worldwide. Lastly, a Google Chrome adblocker extension was found to be injecting affiliate links that generate commissions for its developers.

  • 11-Oct-2021

    Latest Reports on Recent Malware Campaigns

    Tags: Backdoor , Dropbox , FontOnLake , Linux , Malkamak , PAExec , Rootkit , ShellClient
    Label: Threat Advisory
    Threat Level: High

    Over the past week, security researchers performed malware analysis on two main malware files: FontOnLake and ShellClient. The first is a new malware strain targeting Linux OS to harvest credentials. The malware is interestingly engineered, with the main components constantly communicating with each other to allow silent malicious stealth from the host. The second is named ShellClient a seemingly state-sponsored Iranian-operated malware strain that has undergone significant evolution after first emerging during late 2018.

  • 04-Oct-2021

    Latest Reports on Recent Phishing Campaigns

    Tags: Amnesty_International , Credentials , Pegasus , Phishing , RAT , Sarwent , Zix
    Label: Threat Advisory
    Threat Level: High

    This past week, security researchers identified widespread phishing campaigns targeting victims around the world. A fake Amnesty International website promoted a fake antivirus that detects and removes traces of the Pegasus malware, while in fact it downloads the Sarwent RAT. In addition, a credential harvesting campaign targeted various organizations using spoofed Zix encrypted emails.

  • 27-Sep-2021

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: AgentTesla , BEC , BulletProofLink , Credentials , IMAP , Macros , Malware , Password_Spray , Phishing , Phishing-as-a-Service , PowerPoint
    Label: Threat Advisory
    Threat Level: High

    During the past week, security researchers published a report uncovering a massive phishing-as-a-service (PhaaS) operation named BulletProofLink. Also, a report was published this week describing the rise of the use of macro capabilities available in Microsoft PowerPoint to distribute malware in phishing campaigns. In a recent campaign of this kind, the malicious macros loaded the AgentTesla infostealer. In addition, a phishing campaign that was identified and alerted on by Microsoft in June 2021 is reported to still be active in the wild, and has recently been seen affecting a number of CyberProof customers.

  • 20-Sep-2021

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Credentials , Microsoft , Mimecast , Office365 , Phishing , USDOT
    Label: Threat Advisory
    Threat Level: High

    During the past week, researchers uncovered new phishing campaigns affecting individuals and companies around the world. One of these campaigns involved fake emails from IT support departments to lure victims into a fake Mimecast phishing site and steal their credentials. In addition, threat actors were observed impersonating the US Department of Transportation (USDOT). This was part of a new phishing scam related to the recent decision of the US Senate to pass the $1 trillion infrastructure bill on August 10, 2021. The scam was a combination of old tactics in a new pattern that allowed the attackers to get the emails through secure email gateways.

  • 13-Sep-2021

    Latest Reports on Recent Malware Campaigns

    Tags: Backdoor , CPU , DDos , Dridex , Excel , GFRE , Grayfly , Macros , Meris , Microsoft_Exchange , Mimikatz , MySQL , Phishing_Email , RPS , VBScript , Webshell , Wicked_Panda
    Label: Threat Advisory
    Threat Level: High

    Over the past week, several new malware files have emerged in the malware cyber security scene. First, the Grayfly cyber crime group - commonly known as APT-41 - has recently been targeting worldwide companies from a wide range of industry verticals, through a new type of malware that acts as a modular backdoor. Second, researchers recently discovered a new strain of Dridex malware being distributed via a phishing email containing a malicious Excel file. Finally, researchers recently observed the emergence of a new Distributed Denial of Service (DDoS) botnet, which has been registering new records both in terms of RPS and in the number of infected hosts relative to its comparatively short lifespan.

  • 06-Sep-2021

    Latest Developments on Major Ransomware Campaigns

    Tags: Conti , Defacement , Ransowmare , Ryuk , Schtasks , Self-spreading , Shadow_Copy , Wake-on-LAN
    Label: Threat Advisory
    Threat Level: High

    Ransomware operators are constantly looking for ways to make their attacks stronger, faster, and more effective. To this end, threat actors behind ransomware regularly add new tools to their attack routines - as well as exploits to newly disclosed vulnerabilities to be used as infection vectors and/or for lateral movement. Over the past week, security researchers disclosed that affiliates of the infamous ransomware gang Conti are now targeting organizations by exploiting the ProxyShell vulnerabilities to gain access to victims corporate networks.

  • 30-Aug-2021

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: BazarLoader , CAPTCHA , COVID_19 , Credentials , DDos , DMCA , Google_Drive , Mircosoft , Office_365 , Open_Redirects , Phishing , Phishing_Email , zoom
    Label: Threat Advisory
    Threat Level: High

    During the past week, researchers uncovered a few new phishing campaigns affecting individuals and companies around the world. One of these campaigns is using Open-Redirect links and CAPTCHA verification to gain victims' trust and trick them into entering their credentials. Another campaign is causing panic and pressure by using fake Digital Millenium Copyright Act (DMCA) and Distributed Denial of Service (DDoS) threats to manipulate victims into clicking on malicious links and downloading the BazarLoader malware. The third observed campaign is a phishing campaign that takes advantage of the COVID-19 pandemic and the new "COVID pass" document established recently in Europe and Asia - to steal credentials and sensitive information.

Linkedin Linkedin Follow Us
  • Oct 18
    Cybersecurity has been ranked as the second biggest global risk in a new survey of 23,000 risk experts and members of the public. Cyber came second only to climate change on the global stage but was rated the number one risk in America. Read the key findings of AXA Future Risks Report in Infosecurity Magazine: https://lnkd.in/dvUDWJuW
  • Oct 12
    How should CISOs approach their threat detection and response strategy? On October 20 Wave Money's CISO, Dominic Grunden and CyberProof's CISO, Adam Drabik break down the roadmap to building a secure enterprise break: https://hubs.li/H0YQZ9S0 #ThreatDetectionAndResponse #security #XDR #cybersecurity
  • Oct 05
    We’re very proud to announce that we won the “Overall Incident Response Solution Provider of the Year” Award from CyberSecurity Breakthrough . This is the third year in a row that we’ve won the CyberSecurity Breakthrough Awards and it’s a recognition of our work to continuously improve cyber defense. https://hubs.li/H0YLP_r0
  • Sep 29
    A new report from Outseer has found that cybercriminals are increasingly turning to brand abuse to leverage attacks. For the third quarter in a row, brand abuse attacks were the most common attack vector detected. Find out more in ZDNet's article by Jonathan Greig: https://hubs.li/H0YbfP90
  • Sep 22
    What should a mature converged IT-OT security architecture look like? Radiflow's CISO, Rani Kehat and CyberProof's Cyber Security Architect, Aman Malhotra will discuss the key priorities for converged IT-OT security monitoring. Register for our live webinar: https://hubs.li/H0Xcps70
  • Sep 15
    Endpoint Detection & Response (EDR) solutions are important tools to protect against increasing attacks breaching networks. But, is your organization maintaining and optimizing this technology so it works to meet your goals? Arik Day shares 5 ways to make the most out of your EDR technology, by leveraging network vulnerabilities at the endpoint. Read the full blog here: https://hubs.li/H0X4NHX0
  • Sep 07
    While potentially unwanted programs, also known as PUPs, are not considered malware, nor are they malicious by design, this blog, written by CyberProof's Mark Vaitzman, explores what makes them so dangerous and shares what you can do to help mitigate the risks caused by these programs. Click here to learn how you can avoid the often underestimated threats hidden in PUPs: https://hubs.li/H0WmMkB0
  • Aug 31
    What’s the current state of online fraud for this quarter? According to TransUnion's recent report, fraudsters are shifting from the financial services industry to attacking the gaming, travel and leisure industries at alarming rates - sharp spikes consisting of triple-figure percentages were observed in these fraudsters' new primary targets. In the United States, cyber-fraud in the gaming industry grew by 261.9%. Globally, the figure was even higher at 393%. Find out why this shift is happening and what you can do to protect yourself from these attacks: https://hubs.li/H0VLTTJ0
  • Aug 23
    We’ve got exciting news to share! In the most recent ISG (Information Services Group) Provider Lens Report, ISG researchers evaluated the top Managed Security Service Providers across the US and recommended CyberProof as a leader in Managed Security Services for large US accounts. Download the full report here to learn more: https://hubs.li/H0Vvt8F0
  • Aug 17
    While potentially unwanted programs, also known as PUPs, are not considered malware, nor are they malicious by design, our latest blog written by CyberProof's Mark Vaitzman explores what makes them so dangerous and shares what you can do to help mitigate the risks caused by these programs. Click here to learn how you can avoid the often underestimated threats hidden in PUPs: https://hubs.li/H0VjJN40
  • Aug 10
    A cyberattack on a hospital network in 2020 was recently revealed to be caused by an employee who opened a personal email containing malware on the company’s laptop while on vacation. This led to the crippling of computer systems in 6 hospitals in New York and Vermont and cost over $50 million in lost revenue. Get the full story here: https://hubs.li/H0TFYt-0
  • Aug 04
    Microsoft’s Azure Data Explorer (ADX) solution provides security teams with the ability to process large sums of data at faster speeds. In this blog, Saggie Haim explains how CyberProof has reduced data processing costs with the use of Microsoft’s Azure Data Explorer (ADX). Read this blog for the details: https://hubs.li/H0Ts2QL0
  • Jul 27
    Interested in expert guidance on how to address the potential issues that result from establishing hybrid security monitoring with Microsoft Security Stack? Sign up for our upcoming webinar to find out more: https://hubs.li/H0SGn_w0
  • Jul 20
    Ransomware attacks cost companies over $100 billion a year. Making matters worse, the overwhelming majority of ransomware attacks now include a threat to leak stolen data if the ransom isn’t paid - a technique called “double extortion.” Here are 5 important tips to help prevent your company from becoming the next headline: https://hubs.li/H0R_v710
  • Jul 14
    On July 14, CyberProof will participate in the InfoSecurity Europe 2021 virtual Technology Showcase, where you’ll have the opportunity to learn how we enable customers to adopt a co-sourced SOC. Click here to learn more: https://hubs.li/H0S7-Xt0
  • Jul 06
    Interested in developing investigation guidelines and determining recommended actions for cyber security alerts and incidents? Apply today to be our next SOC Level 2 Analyst in India! Click here for more information: https://hubs.li/H0Ry_vY0
  • Jun 29
    We’re pleased to announce our recognition by Frost & Sullivan in the 2021 Europe Technology Innovation Leadership Award for our exceptional hybrid model that enhances customer security operations. Read the details here: https://hubs.li/H0R4Vpw0
  • Jun 22
    Eager to provide growing organizations with excellent cyber incident remediation services and strengthen their security standing? CyberProof is seeking a Senior Security Analyst to join our dynamic team in Tel Aviv! Apply today: https://hubs.li/H0PqmjK0
  • Jun 15
    The following article by SC Magazine describes the extent to which employees depend on threat hunting teams to catch email attacks. Organizations should place higher priority on training initiatives that help employees detect email scams independently - thereby freeing up threat hunting teams to invest more of their time in identifying new threats and enhancing security operations. https://hubs.li/H0Q841N0
  • Jun 09
    Proud to be part of this wonderful project! CyberProof’s cyber security experts have started mentoring high school students, with the help of educational nonprofit Aharai-Tech. Aharai-Tech provides training in cyber security for youngsters from Israel’s periphery - opening the door to a career in tech.
  • Jun 01
    Now’s the time to register! On June 8, 2021 at 10:00 PST | 18:00 BST | 19:00 CET Rob Forde, Service Definition Manager, Niv David Pur, Senior Cyber Threat Analyst, and Ben Chant, Product Marketing Manager will host a live webinar on how to detect and respond to ransomware threats. Register here: https://hubs.li/H0PgG0b0
  • May 25
    Now’s your chance to find out the level of your SOC’s maturity. Take our 5 minute SOC Maturity quiz to receive tailored recommendations on how to further improve your level of threat visibility, incident handling and team collaboration: https://hubs.li/H0NWp5P0
  • May 19
    Get ready to join CyberProof’s webinar on May 25 at 11:00 EST | 17:00 CET as we discuss the recommendations for SOC teams to effectively mitigate cyber threats. Click here to register: https://hubs.li/H0NqBzk0
  • May 12
    Widespread work-from-home practices mean it is no longer practical for employees to be limited to on-premises infrastructure or dedicated endpoints. They expect increased mobility and quick access, and Office 365 meets these demands. But what do you need to know to implement Office 365 without increasing the risk of cyber attacks? Read about our “Best Practices” implementing Office 365 here: https://hubs.li/H0MXwyt0
  • May 05
    This year, we saw a spike in ransomware, data breaches, and other kinds of attacks at healthcare facilities and hospitals. Read our blog post about why healthcare organizations are particularly vulnerable to cyber threats - and what preventative measures you can take to reduce the risk to your organization. https://hubs.li/H0LrGCm0
  • Apr 28
    Read our latest blog, “A Trojan Horse: Protecting Yourself from Malicious Browser Extensions,” by Hen Porcilan to discover how browser extensions can be manipulated by threat actors, and how employees can implement specific steps to mitigate such threats: https://hubs.li/H0KGNPb0
  • Apr 20
    What can hospitals and other healthcare providers do to protect their organizations from cyber attack? Read our latest blog post to learn about the dangerous cyber security incidents that are having an impact on the healthcare sector and what you can do to reduce risk to your organization. https://hubs.li/H0LrG9x0
  • Apr 14
    Congratulations to Saggie Haim for receiving a Most Valuable Professional distinction from Microsoft, demonstrating his excellence in providing impactful solutions for international companies and supporting their secure transition to the cloud! 🏆🏆 https://hubs.li/H0KXqLP0
  • Apr 07
    The number of business email compromise cases is on the rise and posing a major threat to the financial investment sector, as cyber attackers are carrying out these campaigns in a legitimate and targeted manner SC Magazine breaks it down here. https://hubs.li/H0JtjGM0
  • Apr 01
    SITA shared that passenger data stored in their U.S. servers have been accessed in a cyber attack. Numerous airlines have consequently been affected as well. Read more about the cyber breach from TechCrunch https://hubs.li/H0Jtj8s0
  • Mar 23
    How can security and risk professionals do more to mitigate cyber security threats? In this Forrester report, discover how understanding and implementing threat intelligence into your security architecture can dramatically impact your organization’s threat defense efforts. Click here for the full report: https://hubs.li/H0HQ_V70
  • Mar 16
    In honor of International Women's Day 2021, CyberProof executives, Tony VellecaYuval Wollman, and Angela Schoeman (CISM) were hosted as a panel by Emi Palmor about how men and women can work together as allies. Throughout the month we'll be sharing insights and learning from the panel and audience discussion as we continue to grow as a company and our responsibility to our employees. https://lnkd.in/dhJ9j8q
  • Mar 09
    Hear from Arik Day, EDR Lead, Nils Haza, Sr. Solutions Architect, and Ben Chant, Product Marketing Manager on March 16th, 2021 at 11:00 EST as they discuss how you can get the most from your investment in EDR technology. Sign up here: https://hubs.li/H0HGKfS0
  • Mar 03
    WestRock has recently been subject to a ransomware attack that was discovered on January 23, 2021. As a result, their operational technology systems, including managing and monitoring equipment were affected. Click here to read the full story: https://hubs.li/H0HnsH80
  • Feb 23
    In this report, you’ll discover the techniques used by attackers throughout the incident lifecycle, as well as the steps taken by defenders to detect and prevent them. Click here to access the report: https://hubs.li/H0GyZps0
  • Feb 17
    According to Proofpoint’s State of the Phish report, the number of ransomware attacks continues to surge as employees continue to work remotely. Phishing attempts saw a notable increase, especially in the United States, as such attacks spiked by 14%. Read the full story: https://hubs.li/H0GzP3_0
  • Feb 09
    CyberProof CEO, Tony Velleca, speaks to Business Today, addressing the changes in cyber security budgets as the number of cyber attacks is on the rise. Click here to read the article: https://hubs.li/H0Fz_RB0
  • Feb 03
    According to a recent report published by Fox-IT, a cyber attacker gained access to the private networks of organizations within the hi-tech and aviation industries. Read the details by SCMagazine here: https://hubs.li/H0FzSKw0
  • Jan 27
    The key to managed threat intelligence is targeting. Your data needs to be from high quality, relevant sources that deliver insights necessary to improve your cyber security. In this blog you’ll learn about four considerations for collecting the right data: https://hubs.li/H0DL14m0
  • Jan 20
    The recent cyber breach against SolarWinds is increasingly referred to as the Pearl Harbor of U.S. cyber security. What can we learn from this malware attack? Read the details here: https://hubs.li/H0DKZjr0
  • Jan 13
    How do you maintain transparency of outsourced SOC activities while demonstrating value to the board? Our eBook provides examples of how this can be achieved along with other common SOC challenges faced by Financial Services organizations: https://hubs.li/H0D2-SD0
  • Jan 07
    Infrastructure for enterprises requires a proper security framework. In this blog, CyberProof’s Arik Day provides a detailed look at SIEM and EDR technologies, and provides his insights on when each solution is most relevant to your business: https://hubs.li/H0DqKKQ0
  • Dec 31
    The key to managed threat intelligence is targeting. Your data needs to be from high quality, relevant sources that deliver insights necessary to improve your cyber security. Here are four considerations for collecting the right data. https://hubs.li/H0CD0X10 #ThreatIntelligence #CyberSecurity
  • Dec 30
    The cyber breach against SolarWinds is increasingly referred to as the Pearl Harbor of U.S. cyber security. What can we learn from this malware attack? Click here to learn more: https://hubs.li/H0D72zd0
  • Dec 29
    A surge in online fraud is putting pressure on SOC teams in financial organizations to monitor hybrid environments while responding quickly to confirmed incidents. Download “Augmenting Your Security Operations Center,” to learn the common scenarios in which these organizations can augment their capabilities in a sustainable way: https://hubs.li/H0D30vR0
  • Dec 28
    After discovering a vulnerability in their system which exposed account registration information, Spotify has strongly encouraged users to change the passwords of all accounts that use the same email address and password. Click here to read about the data breach: https://hubs.li/H0CW5Xm0
  • Dec 25
    Congratulations to the winners of UST's InfoSec Week 2020! These CyberProof team members made us proud. Hat's off to Francisco Jose Tapia GarcíaFrancisco Andreu, Francisco Buendia, Eduardo C., Julian Cid and Mikhail Haiduchenko!
  • Dec 18
    Part of qualified MDR services includes the ability to offer comprehensive response actions. Read the detailed retrospective of Forrester’s latest MDR report by CyberProof’s Ben Chant, CISMP, AMBCS to learn more: https://hubs.li/H0CJpn60
  • Dec 17
    The MITRE ATT&CK helps create a smarter #SOC through threat intelligence mapping, data source gap identification, among other methods. CyberProof’s Chief Technology Officer and cyber visionary, Eran Alshech, discusses how MITRE can help to transform your security operations in the following blog post: https://hubs.li/H0BnmtB0
  • Dec 16
    Turn common cyber security challenges into opportunities by integrating automation and AI into your SOC, creating a more efficient threat intelligence program. Start conquering your hurdles today. https://hubs.li/H0CCtky0 #AI #SOC #ThreatIntelligence #CyberSecurity
  • Dec 15
    The global energy corporation Energias de Portugal (EDP) was exposed to a severe malware attack in April. Attackers threatened to publicize critical information regarding the well-known company if their ransom sum of $10.9 million wasn’t paid. Read the story here: https://hubs.li/H0C5ncT0
  • Dec 14
    In 2020 threat actors increasingly exploited remote workers and relief fund recipients. This blog, by Nethaniel Ribco, Senior Cyber Threat Intelligence Specialist at CyberProof, provides shocking statistics and graphs illustrating the rise of #cyberattacks >> https://hubs.li/H0C5lb10
  • Dec 11
    Employees at GoDaddy were misled into transferring control of certain domain names to malicious threat actors through vishing (voice phishing) scams. Cryptocurrency trading platforms, Liquid and NiceHash, were subject to this attack. Read the story here: https://hubs.li/H0C5ndS0
  • Dec 10
    Even though the #Tor browser is capable of providing anonymity, it can increase the risk of cyber attacks. Learn more about specific threats that Tor poses in the following blog by CyberProof’s Senior Cyber Threat Intelligence Specialist, Nethaniel Ribco: https://hubs.li/H0BnhWF0
  • Dec 08
    At The #SmarterSOC Virtual Summit, we heard from Ann Johnson, Corporate Vice President at Microsoft, together with CyberProof’s President, Yuval Wollman, as they discussed the impact of COVID-19 and how it has forced us to reassess how we look at cyber security. Learn more about these insightful topics, and other highlights: https://hubs.li/H0BntY70
  • Dec 07
    Maintaining remote security is an obstacle that requires the implementation of precautionary measures. The following blog provides recommendations and effective examples to promote enterprise network safety: https://hubs.li/H0zds7M0
  • Dec 03
    The MITRE ATT&CK Framework enables businesses to protect themselves from #cybersecurity risks by leveraging the data it gathers to support agile use case development. Read more here: https://hubs.li/H0Bn4X10
  • Dec 02
    As a record number of online transactions are expected to be made this holiday season, mainly due to COVID-19, mitigation measures should be implemented by retailers in order to prevent potential #cyberthreatsMahesh Athalye Senior Director at UST Global, shares the various steps retailers, and consumers should consider as they shop online: https://hubs.li/H0zGjYn0
  • Nov 30
    Remote workers are faced with common #vulnerabilities that are increasing in risk over time, including unsecured network connections among other threats related to remote security. Read more about the various solutions to maintain a secure standing for your organization. https://hubs.li/H0zgcxx0
  • Nov 24
    In order to properly handle Use Case threats, understanding the various characteristics unique to your organization is of utmost importance. This includes your industry threat landscape and operating regions, among other factors. Jaimon Thomas, our Head of Global Security Solutions and Architecture, details these necessary strategic considerations for your business: https://hubs.li/H0zfM--0
  • Nov 22
    #Threatactors behind the #cybercrime marketplace, Plugged, are looking to make it prominent in the cyber crime community. Read more about the threat techniques that have been discovered: https://hubs.li/H0ztZKH0 #threatintel
  • Nov 21
    The following blog by our Senior Cyber Threat Intelligence Analyst Niv DavidPur provides examines how cyber criminals are sharing video conferencing hacking methods on the #dark web: >> https://hubs.li/H0zv1LL0
  • Nov 20
    CEO Tony Velleca sat down with Jason Remillard from Authority Magazine to break down what companies need to tighten their approach to data privacy. Risk, data protection, GDPR and more are broken down here: https://hubs.li/H0ztRkd0
  • Nov 16
    Why is a #UseCaseFactory significant to your organization’s #cyberhealth and resilience? The following blog by Jaimon Thomas, Head of Global Security Solutions and Architecture at CyberProof examines the power it provides your #cybersecurity strategy. https://hubs.li/H0zghfZ0
  • Nov 13
    Barnes and Noble, the renowned American bookselling company, has recently been a subject of #cyberattack. Sensitive customer information has been accessed by the attackers, including billing and shipping addresses, telephone numbers, and email addresses. The need for strong and secure networks maintenance becomes increasingly significant in order to prevent the spread of #private information and potential #cyberthreats. https://hubs.li/H0z4kwn0
  • Nov 11
    Today we remember our friend and colleague, Tomer Weinstein, CyberProof's Head of Projects from 2018-2019. It's been almost one year since we lost Tomer in a tragic accident that took his life. In memory of Tomer, we have chosen to continue his legacy by creating new opportunities for the next generation of cyber professionals through training, development, and mentorship. We initiated the Tomer Weinstein Internship Program in collaboration with Tomer’s wife, Adi – a program that provides an opportunity for recent graduates to gain hands-on experience in cyber security and technology. Read more: https://lnkd.in/dY4ThVa
  • Nov 10
    This holiday season is named “a digital-first 2020 holiday season” by Gartner due to high numbers of expected online purchases. As such, retailers should be extra vigilant to prevent consumer data breaches and other #cyberattacksMahesh Athalye, Senior Director at UST Global, delves into these issues as online shopping is preparing to scale with the spike in demand: https://hubs.li/H0zBynW0
  • Nov 08
    How can you optimize your company’s approach to data privacy? CEO Tony Velleca sat down with Authority Magazine's Jason Remillard to discuss what’s on the horizon for cyber security from OT to IoT and how companies can start preparing for change: https://hubs.li/H0ztRY30  
  • Nov 06
    Hear from Tony Velleca, CEO of CyberProof, and Howard Silverman, CyberProof’s Head of Marketing at the upcoming BrightTALK 2021 Threatscape Summit on November 12, 2020, at 13:00 GMT (14:00 CET). We will be examining the methods that companies must consider to adapt as they aim to maintain their security in the ever-changing threat landscape. Register here for the webinar! https://hubs.li/H0z9f2S0
  • Nov 04
    Now’s the time for #cybersecurity teams to act with extra precaution. The NSA has published a list of 25 vulnerabilities that are specifically targeted by China, and as a result are prompting cyber security teams to perform crucial techniques in order to support the protection of sensitive infrastructures. One of the most important recommendations by the National Security Agency includes #CVE patching in the NSA advisory. Read about more NSA recommendations in the following article by SC Media: https://hubs.li/H0z4HMT0
  • Nov 02
    It was a pleasure to gather together at The Smarter #SOC Summit and hear from our speakers about how uncertainty has and will continue to shape 2021 #cybersecurity strategies. Thank you to all of the presenters and attendees who participated!
  • Nov 01
    According to Forrester’s recent report, Now Tech: Managed Security Services In Asia Pacific, Q4 2020, the varied level of maturity in APAC requires a flexible MSSP. Ben Chant, CISMP, AMBCS points out how the report demonstrates the critical role MSSPs will play for their organizations within Asia Pacific, as well as the key factors you should consider when evaluating your options. https://hubs.li/H0yzhxx0
  • Oct 29
    A big thank you to Tony Velleca and Doug Saylors for hosting a breakout session at the #SmarterSOC event examining the adoption of a hybrid engagement model and making our #virtualsummit so special!
  • Oct 28
    Threat actors are exploiting a video conferencing vulnerability to do even more damage than dropping malware, gathering credentials and collecting private data. @Niv DavidPur explains how cyber criminals are sharing video conferencing hacking methods on the dark web >> https://hubs.li/H0xxycW0
  • Oct 27
    Our Threat Intelligence team discovered a cyber crime marketplace, Plugged, with over 15,000 customer uses. Senior CTI Specialist Niv DavidPur details the threat actors behind this marketplace in the cyber crime community. https://hubs.li/H0xxqWS0 #threatintel #threatactors #cybercrime
  • Oct 26
    Sean Keef of Skybox Security Inc. details why you should join him and Sinu Peter of CyberProof as they discuss how #SOCs need the ability to classify asset criticality with #threatintel as well as what a ‘Risk-Driven’ approach to #vulnerability management actually means. Register for the Smarter SOC Summit here. https://hubs.li/H0yz6-C0
  • Oct 23
    The 2020 threat landscape has been largely shaped by #COVID19. In this blog we take a closer look at the cyber security trends to date. https://hubs.li/H0y7HjJ0 #Phishing #ZoomAttacks #Ransomware #Malware
  • Oct 22
    Register for the upcoming #SmarterSOC Summit where we will hear from special guest, Lior Suchard as he explores the weaknesses in the minds of the CISO panel and audience to understand their thoughts in order to optimize staff behavior and find gaps in machine intelligence. https://hubs.li/H0y7pVt0
  • Oct 20
    Lior Suchard is joining The Smarter SOC Summit on Oct 27th where he'll be getting into the minds of a CISO panel AND audience! Make sure to have your video on for this session! https://lnkd.in/eYDMKEy
  • Oct 13
    Threat actors are taking criminal behaviour to the larger hacking community, sharing attack methods on the dark web. Our Senior Cyber Threat Intelligence Analyst Niv DavidPur provides details on how they’re exploiting zoom vulnerabilities on this blog >> https://hubs.li/H0xxycT0
  • Oct 09
    The continuous global spread of fake news has been considered a worldwide “infodemic” in recent months. The following blog from our Senior SOC Analyst, Fabio Lior Rahamim details how to identify and prevent the spread of misinformation. https://hubs.li/H0xxyzZ0 #infodemic #FakeNews #FakeCoronavirusNews
  • Oct 08
    Wondering about the evolution of SOC responsibilities? Check out what Sinu Peter, Ben Chant, and Cyril Voisin had to say in this webinar, available on-demand here >>> https://hubs.li/H0xv2ns0
  • Oct 05
    A Bluetooth bug opens devices to a vulnerability that could allow hackers to intercept and manipulate data from hundreds of feet away. ZDNet provides guidance on how to protect against BLURtooth attacks here: https://hubs.li/H0whPJs0
  • Sep 29
    A Bluetooth bug opens devices to a vulnerability that could allow hackers to intercept and manipulate data from hundreds of feet away. ZDNet provides guidance on how to protect against BLURtooth attacks here: https://hubs.li/H0whPJs0
     
  • Sep 26
    Adobe has released security updates addressing multiple vulnerabilities for Adobe InDesign, Framemaker and Experience Manager that if gone unfixed could allow an attacker to run malicious Javascript on a victim’s machine. SC Media reports: https://hubs.li/H0whGcV0
     
  • Sep 25
    The Tesla factory in Nevada was the target of a cyber attack earlier this month. Here's how a loyal Tesla employee, not only refused a $1 million bribe to install malware, but helped the FBI track the conspirator behind the attempted attack. https://hubs.li/H0whX9k0
  • Sep 21
    A serious cyber incident has the potential cost the Australian economy as much as $30 billion AUD. In this blog we review the need for country-wide cyber security practices and advancements. https://hubs.li/H0vmqFF0
  • Sep 17
    Wishing a happy, healthy, sweet and secure new year to those celebrating Rosh Hashana. If you're not celebrating, we still wish you health, happiness, sweetness and security!
  • Sep 16
    Congratulations Anand Trivedi for your nomination to be part of the Confederation of Indian Industry's committee on Insurance and Pension!
  • Sep 15
    As the U.S government looks to help citizens in financial distress due to the pandemic, a new cyber threat has surfaced - intercepting relief funds and loans from the unemployed, small business owners, and more. Read about it here: https://hubs.li/H0v8wgR0 #COVID-19 #CyberThreat #CyberScheming #GovernmentRelief
  • Sep 10
    Email phishing attacks peaked at the onset of COVID-19, and while some email attack tactics have plateaued, the increase in BEC attack volume remains a concern. Take a look at the changing trends in brand impersonation attacks here: https://hubs.li/H0v8KvV0
  • Sep 09
    We’re teaming up with experts from Microsoft on Sept 15th to talk about the evolution of SOC responsibilities, and the key attributes to building a smarter SOC. Register now >> https://hubs.li/H0vh3hD0
  • Sep 08
    Cyber security is continuing to grow even in the face of a pandemic, with the need for cloud-related security leading the growth while enterprises adapt to hybrid or remote conditions. Read more in Forbeshttps://hubs.li/H0vgp6m0
  • Sep 07
    Security researchers warn companies to seek AMIs from trusted sources for their EC2 instances. Threatpost reports on a new details released about how threat actors can easily build malware-laced Community AMIs and make them available to unsuspecting AWS customers >> https://hubs.li/H0v8KvS0
  • Sep 04
    Marketers are only successful if they are able to market for the times, and that goes for marketing scams as well. Here’s how a group of cyber crooks marketed a voice phishing service targeting WFH employees for VPN credentials >> https://hubs.li/H0v8SSd0
  • Sep 03
    Amid the vulnerability of COVID-19 scammers have found a new target - U.S. citizens eligible for stimulus packages and unemployment benefits. This blog explains how scammers are selling and sharing details on anonymous forums to siphon the money intended for people who’ve suffered great financial loss due to the pandemic: https://hubs.li/H0v85dV0 #COVID_19 #CyberThreat #MoneyScam
  • Sep 02
    Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process' according to Forrester's independent evaluation of the top midsize MSSPs. https://hubs.li/H0tGLhp0
  • Aug 31
    There are many powerful defense tools, but using the right one at the right time is key. Join Halim Santoso, Abbas Kudrati, Richard Telleria and Anand Trivedi on September 2nd to learn about the tools you need to be prepared for increasing cyber threats >> https://lnkd.in/d-gPc-f
  • Aug 28
    We are honored to have been named a leader in the new Forrester Wave™ report on MSSPs. Learn their 26 measuring criteria, and what our Head of Cyber Threat Intelligence, Orel Pery, had to say about our 5/5 score in 'Threat Intelligence' https://hubs.li/H0tGMfV0
  • Aug 26
    Scammers have reached a new low, targeting SBAs and individuals suffering from financial straits due to COVID-19. Nethaniel Ribco explains how they are trying to steal the identity of U.S. citizens eligible for unemployment relief: https://hubs.li/H0tZlvz0 #UnemploymentRelief #COVID19 #CyberCriminals #IdentityTheft
  • Aug 25
    Join our webinar on September 2nd as we get together with experts from Microsoft and UST Global to talk about using automation and data analytics to combat the growing risks around us. Register now >> https://lnkd.in/d-gPc-f #securitywebinar #cybersecurityawareness
  • Aug 21
    At CyberProof, we’re thrilled to have been recognized by Forrester as a Leader in managed security services. Take a look at our key takeaways from their latest MSSP Wave™ Report, and how we believe we’ve differentiated ourselves from the competition here: https://hubs.li/H0txGsw0 #managedsecurityservices #MSSP #CyberSecurity
  • Aug 20
    Yuval Wollman, President of CyberProof, comments on our top marks in ‘Delivery Model Strategy' according to Forrester's independent evaluation of the top midsize MSSPs. https://hubs.li/H0tGKHk0
  • Aug 17
    Perimeter defense testing often includes its own form of Pen testing. Social engineering and leveraging weaknesses in the security system are the most common practices for pen-testing. Find out more in our blog. hubs.li/H0t4dkb0 #CyberSecurity #PenTesting #SocialEngineering #PerimeterDefense
  • Aug 16
    Billions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #BootloaderBillions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #Bootloader
  • Aug 15
    As security threats become increasingly sophisticated and highly targeted, organizations must expand detection coverage to rapidly contain and eradicate validated threats. Join our upcoming webinar to learn how to use attack simulations to continuously validate and remediate risks as they emerge. hubs.li/H0t4bdg0 #SecurityWebinar #SOCefficiency #AttackSimulations #CyberAttacks
  • Aug 14
    A cloud-native infrastructure provides more flexibility, scalability and security. Here’s how our membership with the Microsoft Intelligent Security Association is helping CyberProof and Microsoft customers update their security operations for a smarter SOC: hubs.li/H0tqTV_0 #CyberSecurity #Microsoft #Azure #SOC
  • Aug 13
    The word is out - we’ve been named a leader of midsize MSSPs! In this Forrester Wave™ independent report they dive into the 26 criteria of the most significant MSSP providers - we are thrilled to be included as a leader. Read the report now: hubs.li/H0txycd0
  • Aug 12
    Yesterday our CEO, Tony Velleca, and VP of Security Strategy, Bruce Roton, hosted a live security webinar on how companies can measure and improve their cyber defense using the MITRE ATT&CK Framework. Today, we have the recording for you on-demand here: hubs.li/H0sNbv60 #CyberSecurity #SecurityStrategies #MITRE
  • Aug 11
    Billions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #Bootloader
  • Aug 04
    Struggling to understand how you can continuously refine your cyber defense to keep up with emerging threats? On Aug. 18, CyberProof’s Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how organizations can use attack simulations to improve SOC efficiency. Save your spot in this upcoming webinar here: hubs.li/H0t4cCX0 #CyberDefense #SOCefficiency #AttackSimulations
  • Aug 03
    Join our live webinar on August 10th to discover how you can measure and improve your cyber defense using the MITRE ATT&CK Framework - register now! hubs.li/H0sNbxc0 #CyberSecurity #CyberDefense #mitreattack
  • Aug 02
    Establishing a secure perimeter is your first line of defense. This is especially true for areas like the server room where sensitive data - a high-value resource - is stored. In this blog our Senior SOC Analyst Fabio Lior Rahamim shares best practices for establishing a perimeter defense. hubs.li/H0t49Zq0 #PerimeterDefense #Defense #CyberSecurity #SecOps
  • Aug 01
    On Aug. 18th our Principal Security Architect, Robert "Teall" Rist CISSP, CISM, TOGAF 9, CHPA will be teaming up with XM Cyber's Director of Field Engineering, Konstantinos “Gus” Evangelakos, to discuss how you can improve SOC efficiency using attack simulations. Register here to join the conversation >> https://hubs.li/H0t4dcK0 #SOC #SecurityWebinar #AttackSimulations #CyberSecurity
  • Jul 31
    Here are some of the ways Microsoft and CyberProof customers will benefit from our latest partnership: ✔️Seamlessly collate and analyze data ✔️Enriched alerts ✔️Reduced mean time to detect and mean time to respond ✔️Scale security operations capabilities while lowering costs Ben Chant, CISMP, AMBCS shares more about our latest partnership here: https://hubs.li/H0sJ1h80 #CyberSecurity #ManagedSecurity #MSSP #Azure #Microsoft
  • Jul 14
    Evil Corp - a notorious cyber criminal gang associated with the banking credentials-stealing Zeus trojan and Bugat (aka Dridex) malware - is using tried-and-true attack tactics to launch new ransomware, WastedLocker. SC Media reports on the malicious framework being used to deliver the malware. https://hubs.ly/H0r-h_10 #Ransomware #EvilCorp #Malware #CyberCrime
  • Jun 24
    As cyber threats escalate amid budgetary constraints, CISOs are facing a myriad of challenges. On June 24th cyber security experts Terence Gomes, Anand Trivedi, Iftekhar Hussain, and Aman Malhotra will gather to discuss SIEM/SOC challenges as businesses scale down due to COVID-19, followed by a Q&A session. Register today to join the conversation >> https://lnkd.in/dmTU7fx #CyberThreats #CISOs #LiveWebinar #SIEM #SOC
  • Jun 04
    Now more than ever is the time for enterprises to change and adapt. Check out this interview with CyberProof CEO Tony Velleca. Learn about his journey through #SaaS and thoughts on various security threats that arise when a team starts working from home. https://hubs.ly/H0r0_L_0 #CyberSecurity #WFHsafety via SalesTech Star
  • May 20
    Where does a virtual cyber analyst meet human expertise? At CyberProof. We're constantly striving to make the world a better, safer place, in the cloud and on the ground. See how: https://hubs.ly/H0q5-Ft0 #CyberAnalysis #ThreatDetection #HUMINT #ManagedSecurityServices
  • May 04
    Threat actors are infiltrating an already panicked environment with fake coronavirus news. Being able to identify typical pseudo-news characteristics empowers you to weed out fake news stories – and help break the chain of mistrust. https://hubs.ly/H0qlWzL0 #ThreatActors #FakeNews #Infodemic #COVID19
  • Apr 01
    As you adjust to a new remote reality, our cyber threat intelligence team is at work investigating and exposing the latest happenings in the cyber crime communities. This blog identifies the threats and offers critical advice for keeping your cyber health resilient. https://hubs.ly/H0nM_nj0
  • Mar 31
    There’s no question that threat intelligence is a crucial piece of cyber security. But how do you know where, when, what and with whom to start? The answer is here - the ultimate guide to managed threat intelligence >> https://hubs.ly/H0nwvq50
  • Mar 27
    Cyber criminals and state-sponsored threat actors around the globe, are taking advantage of the COVID-19 outbreak to accelerate their activities and spread their own infections. Here’s how you can stay protected as new threats spread across the cyber landscape >> https://hubs.ly/H0nNfYG0
  • Mar 21
    Analysts predict that cyber crime will cost companies $6 trillion by 2021, which is double the $3 trillion it cost in 2015. So, how can organizations close the gap between cyber threats and cyber security? By implementing managed threat intelligence into their security strategy. Read on for a look at everything you need to know about how to ensure ultimate cyber resilience for your company. https://hubs.ly/H0nwb9h0 hashtagThreatPredictions hashtagCyberCrime hashtagSecurityStrategy
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, cyber insider threats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a security program for cyber insider threat identification and remediation. https://hubs.ly/H0nc6lX0 CyberInsiderThreats ProactiveDefence RiskManagement InsiderThreatProgram
  • Mar 09
    New trends have hit the cyber landscape in recent months - including a shift in data regulation, increased applications for AI, ML, deep learning and more. Here’s how we expect it to impact the cyber security industry - both in offensive and defensive security solutions. https://hubs.ly/H0n1MQb0 cyberscape AI hashtagML deeplearning cybersecuritytrends
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 20
    Starting tomorrow and throughout the next two days, we'll be in Bangalore CISO Platform Summit - one of India’s largest #securityevents where #CISOs will gather to share knowledge and empower themselves to make better security buying decisions. Visit us there at booth CP1230: https://hubs.ly/H0m_jJ20
  • Feb 19
    The #cybersecurity arena is facing a new era of threats, trends, and solutions. We conducted a survey across the company here at CyberProof exploring the question of what we can expect to see and uncovered some interesting predictions. Check them out on our latest blog >> https://hubs.ly/H0n1X940 #cybersecuritytrends #threatpredictions
  • Feb 17
    #ArtificialIntelligence can help #SOCs improve efficiency and reduce response times, but how can #AI and #Automation be put into practice on the ground - and in the cloud? This #securityebook provides a detailed guide for SOCs ready to take their #securityoperations into the future. https://hubs.ly/H0mSMzG0
  • Feb 16
    On Feb 21-22 we’ll be joining CISOs from around the world in Bangalore at the CISO Platform Summit, India’s largest #ITsecurity conference of the year. Visit us at booth CP1230 to learn how we’re using #AI and #automation to build a smarter #SOC >> https://hubs.ly/H0m_yWx0
  • Feb 13
    We’re excited to be Diamond Partners in this year’s CISO Platform Summit, India’s largest #ITsecurity conference - focusing on peer learning, security buying decisions and how we, as #threatintelligence leaders, can make a difference to the world of security. https://hubs.ly/H0m_qRQ0
  • Feb 12
    Here's what The Update Box is bringing to #RSAC2020 ✔️ Real-time vendor and press announcements ✔️ The latest info on upcoming speeches ✔️ A chance to win big at the event
    Enter the #RSAC Giveaway Basket raffle here: https://hubs.ly/H0mHYGf0
  • Feb 10
    Join part 2 of our upcoming #securitywebinar series on Feb 20th, to learn about the fundamentals of building an #intruderhunting program as part of your integrated #cybersecurity and risk management architecture. Sign up today >> https://hubs.ly/H0mNmJc0
  • Feb 05
    Our team had a great time at hashtaghc0n2020 sharing, learning, and networking with cyber tech professionals and ethical hackers at the biggest hacking community event in Spain this past weekend. hashtaghackerconference hashtagethicalhackers hashtaghc0n2020
  • Feb 04
    #Malware has been discovered in this device's very own setup app with little to no hope of removing it - and if that's not bad enough - there are TWO of them. SC Media has the details >> https://hubs.ly/H0mHYDY0 #BuyersBeware
  • Feb 03
    Curious what to expect at #RSAC2020? Stay up to date on the latest at this year's RSA Conference with The Update Box, sponsored by yours truly! https://hubs.ly/H0mJ3pD0
  • Feb 02
    Our team had a great time at Hackplayers #hc0n2020 sharing, learning, and networking with cyber tech professionals and #ethicalhackers at the biggest hacking community event in Spain this past weekend.
  • Jan 29
    We're proud to announce that Orel Pery, our CTI Team Leader will be presenting at one of the biggest #cybersecurity knowledge-exchange events of the year - #hc0n2020. Check out her upcoming participation at Hackplayers #hackingconferencehttps://hubs.ly/H0mMXLC0
  • Jan 27
    As we enter the next decade with #digitalization full steam ahead, where are intelligence expert focusing their efforts to stop #cybercriminals in their tracks? Help Net Security reports on #2020cybertrends and where attackers are expected to be heading: https://hubs.ly/H0mJ0D00
  • Jan 15
    The tables have turned on ring camera doorbells. SC Media shares the details on how hackers are gaining control of them and why the need for IoT security should be taken very seriously as we venture further into digitalisation. https://hubs.ly/H0mpr5M0 digitalisation IoT IoTsecurity hackers
  • Jan 10
    What will 2020 bring to the world of cyber security as IoT continues to evolve? Privacy protection is on the top of the list as the public domain as the demand for manufacturers to produce low-cost, integrated devices grows. https://hubs.ly/H0mpr5Y0   cybersecurity privacyprotection publicdomain
  • Jan 08
    Congrats to Yair Bar Touv, Joo Khuan Quek CISSP, CISM 郭裕宽 and team on the completion of the new branding in our Singapore Center of Excellence. The SOC team supports our regional and global customers for hashtagmdr and hashtagmssp services. hashtagcybersecurity hashtagsoc hashtagcyberproof
  • Dec 25
    Happy Holidays from everyone CyberProof. May your holidays will be filled with joy, laughter, and security through the New Year ahead! #HappyHolidays #SeasonsGreetings #HappyNewYear
  • Dec 23
    As we look ahead at the future of AI and cyber security, we must find a way to use AI to reduce and aid the work of the overloaded intelligence analysts - here's how cyber professionals can make that happen. hubs.ly/H0m22Q60 #AI #cybersecurity #ML #SOC #SOCefficiency #SecurityTeams
  • Jan 01
    The #CIATriad reflects a fundamental truth: it is essential for organizations to protect sensitive data from unauthorized access and that starts with #PerimeterDefense. Here's what you need to know. hubs.ly/H0t49ZT0
Twitter Twitter Follow Us
  • Oct 18
    Register for our #SOC Masterclass & join Haim & Soriano’s workshop ‘Optimizing Your Azure Sentinel Platform’ on No… t.co/yakC6Qy1HK
  • Oct 12
    Did you know that the #FinSpy malware is spreading through Unified Extensible Firmware Interface (#UEFI) bootkits?… t.co/sLYygbF6Iq
  • Oct 04
    Rapidly detect, investigate and respond to threats with full transparency with our CyberProof Defense Center. Click… t.co/JNtQ1XE2Wr
  • Sep 27
    Organizations that prepare carefully for a potential #cyberattack may be able to mitigate the risk of attack. What… t.co/fOBGVv8ztV
  • Sep 20
    We’re looking for System/Cloud Infrastructure Engineers in Portugal and the US. If you want to join our growing tea… t.co/C76AUtEBCZ
  • Sep 14
    RT @cyberproofinc: We’re hiring a SIEM Expert to join our team in Poland. Interested in developing new #SIEM rules, correlations and dashbo…
  • Sep 05
    Stay up to date on how to hunt #malware and malicious #cyberattacks as well as mitigation strategies with our Guide… t.co/cmp67MRnwu
  • Aug 29
    As #cyberfraud continues to spike, read @InfosecurityMag's latest article and learn where fraudsters are shifting t… t.co/eu62jL5ktP
  • Aug 23
    Join us on August 26, in our latest #webinar: Visibility Into The Vulnerabilities That Matter and gain important in… t.co/sgS8aV93dO
  • Aug 16
    @cyberproofinc's Mark Vaitzman explores the hidden dangers of #PUPs (Potentially Unwanted Programs) and shares his… t.co/K8LXBSEzQO
  • Aug 10
    Delighted to share that our Director of Global Service Delivery, Angela Schoeman was named one of the “Top 10 Women… t.co/bq63UVZlBP
  • Aug 02
    Do you have the 24/7 monitoring needed to protect your business from cyber attackers who are targeting endpoints to… t.co/OhjCJZb0rb
  • Jul 26
    Join our upcoming webinar hosted by Sinu Peter, Saggie Haim and Ben Chant, “Migrating from On-Prem to Azure-Based T… t.co/81SYwSBUCl
  • Jul 19
    What are some of the ways to optimize cloud security operations to strengthen threat detection and response process… t.co/2npSq14seN
  • Jul 14
    Join @cyberproofinc at 12pm as we discuss smarter security operations with a hybrid SOC. Learn how to leverage the… t.co/fz9pKJ5XgI
  • Jun 30
    We’re pleased to announce that CyberProof received the Globee® recognition for “Startup of the Year” as part of the… t.co/CM9QbUnVyy
  • Jun 28
    Watch our on-demand webinar “The Inner Workings of Cyber Defenders” to find out how to prevent malspam and credenti… t.co/sOWnysYzsO
  • Jun 21
    In 2020, malware attacks increased by 54% - compared to 2019. Many businesses and medical institutions were faced w… t.co/s7cxd7U9og
  • Jun 14
    Now’s your chance to find out how to overcome the potential challenges faced when implementing cloud operations wit… t.co/WCUPzjpzhN
  • Jun 08
    Are you interested in an opportunity to be an integral part of design review and implementation? Apply to join the… t.co/irjHkACKeu
  • May 31
    CyberProof’s cyber security experts are mentoring high school students from the Israeli cities of Dimona and Tirat… t.co/0XY9k1BuuX
  • May 24
    Discover how to prevent malspam and credential threats at CyberProof’s upcoming webinar on May 25 at 11:00 EST | 1… t.co/SONOPprl71
  • May 12
    Does #cybersecurity keep you up at night? Join @TonyVelleca @cyberproofinc @USTglobal and @boccuzzillc and John Wes… t.co/75Qgu65KQL
  • May 10
    Does #cybersecurity keep you up at night? Join @TonyVelleca @cyberproofinc @USTglobal and @boccuzzillc and John Wes… t.co/zFUn0Er63F
  • May 03
    In this blog, the CyberProof Research Team discusses the dangerous cyber incidents that are negatively impacting th… t.co/ueMqRTHghX
  • Apr 22
    Learn about the precautionary measures that employees can implement in order to avoid the risks of malicious browse… t.co/OAom8mZj4C
  • Apr 19
    Congratulations Use Case Factory from @cyberproofinc for winning Silver in 2021 #CybersecurityExcellenceAward in t… t.co/bXyz8c20up
  • Apr 13
    The increased number of cyber attacks over the past year has made it more important than ever to integrate effectiv… t.co/t5qddUDcxY
  • Apr 06
    Get ready to hear from Sion Hughes, Adam Drabik, Jaimon Thomas, and Ben Chant at our webinar on April 13, 2021 at 1… t.co/n1fo2Qts0L
  • Mar 29
    At CyberProof’s International Women’s Day panel, Tony Velleca, CEO at CyberProof, shared the foundations of CyberPr… t.co/kFso6dW180
  • Mar 21
    Yuval Wollman, President of CyberProof participated in our panel discussion in honor of International Women’s day,… t.co/lQAxnpzoFp
  • Mar 16
    Remain a step ahead of cyber attacks and enhance your organization’s defense systems with wargaming tactics. Read t… t.co/atWAKj9IQs
  • Mar 08
    Eager to learn how to make the most out of your investment in EDR technology? Now’s your chance to participate in o… t.co/Uj8seUbFXd
  • Mar 02
    Read how CyberProof uses Azure Sentinel to create Alert Rules that search for customer-specific IOCs in their envir… t.co/yIc7CMRGsZ
  • Feb 22
    Have you registered for tomorrow’s webinar, The Inner Workings of Cyber Defenders? Explore the collaboration techni… t.co/54Zkr6Khrx
  • Feb 16
    In a recent data breach against a Pennsylvania law firm, sensitive information of over 36,000 University of Pittsbu… t.co/2c1AxnuYsP
  • Feb 08
    Saggie Haim details the planning needed for deploying Azure Sentinel in a multi-tenancy environment in a 2 part ser… t.co/5yJH6tgfpN
  • Feb 01
    Read more about how CyberProof has recently received an impressive score of 5/5 on “Threat Intelligence” by Forrest… t.co/Yl7QaWHShD
  • Jan 26
    British Airways is planning to provide compensation up to £3 billion to victims of their breaches in 2018.… t.co/eWjbI25ium
  • Jan 19
    Saggie Haim details the planning needed for deploying Azure Sentinel in a multi-tenancy environment in a 2 part ser… t.co/7wzvwy4dwB
  • Jan 13
    Read our latest eBook to learn how FS organizations can improve the efficiency of their SOC without investing more… t.co/yY8Pmr8bCN
  • Jan 07
    Are you eager about intelligence analysis? Apply here to be our next Threat Intelligence Analyst in Tel Aviv. Click… t.co/JqryvK2wFg
  • Dec 30
    Read through our best of 2020 interviews for some latest #salestech trends and tools you need to adapt now!… t.co/ZNaQlldPbO
  • Dec 30
    Adrozek, a severe malware that has targeted browsers including Google Chrome and Mozilla Firefox. Read here how use… t.co/0EwYal9UfZ
  • Dec 28
    Read more about why a #UseCaseFactory is significant to your organization’s #cyberhealth and resilience in the foll… t.co/qD4iVkK77z
  • Dec 28
    Spotify has been exposed to a data breach, where personal user information has been accessed by third-party busines… t.co/qE7VUmx6Cj
  • Dec 27
    Download our free eBook to learn how Financial Services organizations can augment their security operations to help… t.co/jURaiTm4jy
  • Dec 24
    After being exposed to the Egregor ransomware, Randstad, an international recruitment agency, shared that sensitive… t.co/XeSYPlwk1t
  • Dec 23
    On October 27, 2020 we hosted The Smarter SOC Summit, where top cyber professionals dove into the importance of… t.co/qkqtwc0r0G
  • Dec 17
    CyberProof’s Ben Chant discusses the fundamental takeaways from Forrester’s latest NowTech MDR Report. Click here t… t.co/QQzfRLhFVO
  • Dec 16
    RT @cyberproofinc: How can the #MITRE ATT&CK Framework help secure organizations from potential #cybersecurity threats? CyberProof’s Chief…
  • Dec 16
    Canon has publicly shared that they have been exposed to a ransomware attack in August 2020. As a result of this cy… t.co/iRAQpLYEQP
  • Dec 16
    How can the #MITRE ATT&CK Framework help secure organizations from potential #cybersecurity threats? CyberProof’s C… t.co/N34evLqsTz
  • Dec 15
    Read about the threatening techniques that #cybercriminals have used in 2020 against #remoteworkers, the… t.co/gDJGSgKSAx
  • Dec 15
    After being exposed to a ransom attack in April, Portuguese energy company Energias de Portugal (EDP), was faced wi… t.co/eRiXnNdrod
  • Dec 15
    Turn common #CyberSecurity challenges into opportunities by integrating automation and #AI into your #SOC. Start co… t.co/fGVXBty4tU
  • Dec 14
    @cyberproofinc Please follow @i2_chain and try our product for free to secure, transact, and protect your health da… t.co/zL8qataNA1
  • Dec 10
    Last week, ‘GoDaddy,’ the popular domain hosting provider, was subject to malicious attack. Employees were misled i… t.co/G9hynSCFmX
  • Dec 10
    Unsecure networks are one of the many vulnerabilities posed to #remoteworkers. Learn how to reduce #cyberthreats an… t.co/fdiO05gCxr
  • Dec 10
    RT @cyberproofinc: This holiday season is named “a digital-first 2020 holiday season” by Gartner due to high numbers of expected online pur…
  • Dec 09
    Some of the threats that the Tor browser can pose to businesses include exposing corporate networks to malware infe… t.co/GWIoIBze9w
  • Dec 08
    This holiday season is named “a digital-first 2020 holiday season” by Gartner due to high numbers of expected onlin… t.co/Iy05doVKPP
  • Dec 08
    Just a few weeks ago, we hosted The Smarter SOC Summit, where global-leading cyber security professionals joined to… t.co/sNNmLTsD2A
  • Dec 08
    Learn more about the high efficiency in threat detection that CyberProof and @Microsoft's integration solution pro… t.co/6jKSThjIMm
  • Dec 03
    Learn more in this blog by CyberProof’s Chief Technology Officer and Cyber Visionary, Eran Alsheh about how the… t.co/b8tdAcwVIg
  • Dec 02
    As #cybercriminals target #wfh employees, proper precautionary measures need to be taken to maintain… t.co/QVjH415t56
  • Dec 02
    In order to prepare to defend against malicious cyber attacks targeting consumer data this holiday season, retailer… t.co/zLjhqcbc0O
  • Nov 30
    Which fundamental steps should organizations consider when building a #SmarterSOC? The following blog post by Cyber… t.co/4waImvLS8G
  • Nov 26
    Link previews, one of the features used within trending chat apps to preview images and descriptions of links, are… t.co/vyIdQepvmV
  • Nov 26
    How are threat actors looking to grow an uncovered #cybercrime marketplace named Plugged? Read more in this blog by… t.co/DwG0ZtCHMO
  • Nov 25
    As you aim to optimize your security operations, it is important to take your company’s unique security needs into… t.co/ZgwDbFap6A
  • Nov 24
    RT @cyberproofinc: The popular online children’s game, Animal Jam, has been hacked, exposing millions of users to a data breach. Private in…
  • Nov 24
    Upon the conclusion of Chinese hacking competition, the Tianfu Cup, 11 successful attacks were announced, including… t.co/aKIkhzwdr2
  • Nov 23
    At the Smarter SOC Summit, we heard Tony Velleca, CEO of CyberProof, and Doug Saylors, Director of ISG, as they dis… t.co/Pwwk6NRflv
  • Nov 23
    Read about how cyber criminals are taking criminal behaviour to the larger #hacking community by sharing video conf… t.co/f7ajJ2xI6c
  • Nov 20
    The popular online children’s game, Animal Jam, has been hacked, exposing millions of users to a data breach. Priva… t.co/i5ZDkyJVQz
  • Nov 12
    Discover the evolution of SOC responsibilities in this webinar by Sinu Peter, Ben Chant, and Cyril Voisin >>> t.co/R35DaDeXYH
  • Nov 11
    Our #threatintel team has discovered +15,000 uses of Plugged, a cyber crime marketplace. @DavidpurNiv shares how th… t.co/iRTCcEjZhk
  • Nov 10
    #Cyberattacks could be on the rise this holiday season. Read more about how to protect your company and your custom… t.co/rq5ErK0H51
  • Nov 10
    While much of the world has been forced to slow down in 2020, #cybercriminals have been busier than ever. This blog… t.co/iDCor4KDRY
  • Nov 09
    The @NSA has issued a list of 25 #vulnerabilities targeted by Chinese #cyber offenders, encouraging #cybersecurity… t.co/J7iimndV1q
  • Nov 08
    RT @cyberproofinc: At The Smarter SOC Summit, former Mossad Director Tamir Pardo comments on the #cyberthreats to #democracy “Cyber is a th…
  • Nov 08
    RT @USTGlobal: UST’s @cyberproofinc constantly innovates to improve its #cybersecurity offering. That's why they're the @InfoSec_Awards Sec…
  • Nov 08
    Now’s your chance to learn how to fill security gaps of your company’s security through the use of handy tools incl… t.co/b7a7JL4f7W
  • Nov 06
    RT @USTGlobal: UST’s @cyberproofinc constantly innovates to improve its #cybersecurity offering. That's why they're the @InfoSec_Awards Sec…
  • Nov 05
    UST's @cyberproofinc is a radically different approach to #cybersecurity. @TonyVelleca explains why our strategy is… t.co/mZWZNhSVQn
  • Nov 05
    A huge congratulations to our #CISO and Director of Risk & Compliance, Adam Drabik for winning the UK #CSO30 Awards… t.co/uTbRFNHsLE
  • Nov 05
    Now’s your chance to hear from our CEO, Tony Velleca, and Head of Marketing, Howard Silverman about the defense met… t.co/6QFiWvS3qE
  • Nov 04
    At our upcoming live webinar on November 12, you’ll have the opportunity to hear from both our CEO and Head of Mark… t.co/5yD5s8een6
  • Nov 03
    RT @cyberproofinc: According to @Forrester’s recent Now Tech report the varied level of maturity in APAC requires a flexible #MSSP. In this…
  • Nov 03
    At The Smarter SOC Summit, former Mossad Director Tamir Pardo comments on why #cyberthreats are everywhere… t.co/Q44F1qTjMo
  • Nov 03
    At The Smarter SOC Summit, former Mossad Director Tamir Pardo comments on foreign government influence in the 2016… t.co/aCYr2YNlRo
  • Nov 03
    CyberProof is hiring SOC Level 2 Analysts to join our expanding team! Apply today for the opportunity to join our g… t.co/icJmbTnxY1
  • Nov 03
    The US government and its citizens are increasingly aware of online security threats throughout the election proces… t.co/Q1Bni7l6hy
  • Nov 02
    At The Smarter SOC Summit, former Mossad Director Tamir Pardo comments on the #cyberthreats to #democracy “Cyber is… t.co/ZAaFOGKgy0
  • Nov 02
    American bookselling firm, Barnes and Noble has publicized to its customers that their network has been recently… t.co/5O5HChd54m
  • Nov 02
    Thank you Tamir Pardo and Tony Velleca who led the informative keynote session at The #SmarterSOC Summit and making… t.co/qqxZ8q1oR8
  • Nov 01
    What a turnout! We would like to thank all of the presenters and attendees who joined The #SmarterSOC Summit and ma… t.co/wLZNqWvTBl
  • Oct 31
    One of the leading technology research firms, @forrester, has just released the Now Tech report for #AsiaPacific, h… t.co/d1BWqbZgAl
  • Oct 30
    What have been the most common #cyberattack techniques used in 2020 so far? In this blog we take a closer look at h… t.co/8gHzvCrEwT
  • Oct 29
    According to @Forrester’s recent Now Tech report the varied level of maturity in APAC requires a flexible #MSSP. In… t.co/eOxZBKUun1
  • Oct 29
    Thank you to all of the speakers who made The #SmarterSOC Summit possible! Tamir Pardo, @TonyVelleca, @ajohnsocyber… t.co/ZW4usRL7fm
  • Oct 28
    RT @USTGlobal: UST’s @cyberproofinc constantly innovates to improve its #cybersecurity offering. That's why they're the @InfoSec_Awards Sec…
  • Oct 28
    UST’s @cyberproofinc constantly innovates to improve its #cybersecurity offering. That's why they're the… t.co/iETs6ACpnG
  • Oct 28
    A big thank you to Lior Suchard for leading such a captivating session at The #SmarterSOC event. It was fun watchin… t.co/2tH40sVeem
  • Oct 28
    RT @cyberproofinc: [BLOG] Threat Actors Share Video Conferencing Hacking Methods on the Dark Web by CyberProof’s Senior Cyber Threat Intell…
  • Oct 28
    [BLOG] Threat Actors Share Video Conferencing Hacking Methods on the Dark Web by CyberProof’s Senior Cyber Threat I… t.co/1PnF6auRKs
  • Oct 27
    After some remarkable #cybersecurity sessions, we're finishing up The Smarter SOC Summit with Master Mentalist… t.co/XCBdhxxEvw
  • Oct 27
    RT @cyberproofinc: Join our SOC sessions on Oct 27 where we’ll thoroughly discuss how #SOCs need the ability to classify asset criticality…
  • Oct 26
    During a time of concern and confusion, misinformation is on the rise. The @WHO has named this an #infodemic. Our S… t.co/LnyWwfQFvN
  • Oct 26
    RT @cyberproofinc: Join our SOC sessions on Oct 27 where we’ll thoroughly discuss how #SOCs need the ability to classify asset criticality…
  • Oct 26
    Join our SOC sessions on Oct 27 where we’ll thoroughly discuss how #SOCs need the ability to classify asset critica… t.co/aHKroRfDF2
  • Oct 25
    Join our SOC sessions on October 27th where our speakers Ann Johnson, @Microsoft VP of Security, and Yuval Wollman,… t.co/g3Iwf3qkqJ
  • Oct 23
    Plugged, a #cybercrime marketplace uncovered by our #threatintel has +15K customer uses and is aiming to grow as a… t.co/nI5z6BgUoa
  • Oct 23
    Virtual Summit countdown! 4 days to go. Have you registered yet? t.co/l6jOsI5QJ3 t.co/mq9PKpYMBZ
  • Oct 22
    Register for the upcoming Smarter SOC Summit where @ISG Cyber Security Director Doug Saylors and our CEO… t.co/Br2xrtztjM
  • Oct 09
    The escalation of constant wild rumors in the news has been titled an #infodemic by the @WHO. Read more in the foll… t.co/x3IDViGFoc
  • Oct 08
    RT @cyberproofinc: Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC respo…
  • Oct 07
    Threat actors are taking criminal behaviour to the larger #hacking community, sharing #cyberattack methods on the… t.co/vMKdwLQkFK
  • Oct 06
    RT @cyberproofinc: Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC respo…
  • Oct 06
    Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC… t.co/9tkvSFV0yw
  • Oct 01
    According to a recent survey in the #cybersecurity industry, about 67% of #securitybudgets stayed the same, or slim… t.co/cj4mVCBIuG
  • Sep 29
    A Bluetooth bug opens devices to a vulnerability that could allow #hackers to intercept and manipulate data from hu… t.co/Z8GVQuCJUp
  • Sep 25
    Adobe has released #cybersecurity updates addressing multiple #vulnerabilities for Adobe InDesign, Framemaker and E… t.co/wp8THMH5u3
  • Sep 24
    How do you reduce security risk in turbulent times, while remaining within budget? Check out 5 tips for #CISOs from… t.co/47EgERC7W2
  • Sep 21
    #CyberAttacks threaten the digital economy. Staying in control both with the correct tools and leadership is key. L… t.co/pT42EZXfIz
  • Sep 17
    As the U.S government looks to help citizens in financial distress due to the pandemic, a new #cyberthreat has surf… t.co/IlyPjRx6VG
  • Sep 16
    Did you miss @CyberProofInc and Microsoft's webinar on building a smarter SOC? You can watch it on demand… t.co/J3GckoCTPp
  • Sep 16
    Yesterday our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolutio… t.co/VxyauNE9yw
  • Sep 16
    RT @cyberproofinc: MITRE, creator of the ATT&CK Framework, has a new #CyberDefense resource called “Shield”. @SecurityWeek explains how #MI…
  • Sep 16
    MITRE, creator of the ATT&CK Framework, has a new #CyberDefense resource called “Shield”. @SecurityWeek explains ho… t.co/FapOJt7Hld
  • Sep 15
    How do #CISOs maintain a strong level of security in an era of growing threats and shrinking budgets? Read this blo… t.co/TxYQJtsGbX
  • Sep 14
    Email #phishing attacks peaked at the onset of #COVID_19, and while some threat tactics have plateaued, the increas… t.co/oy8NEewWxT
  • Sep 09
    A group of #cybercrooks are marketing a voice #phishing service targeting #WFH employees for VPN credentials.… t.co/8TiSx9KWiC
  • Sep 08
    Amid the vulnerability of #COVID_19 scammers have found a new target - U.S. citizens eligible for stimulus packages… t.co/QfXttIIWyI
  • Sep 08
    With the changing landscape brought on by #COVID_19, SOC expectations have been amplified. On Sept. 15th we’ll be t… t.co/02PiDFwW5r
  • Sep 07
    Estamos orgullosos de compartir el reconocimiento de @cyberproofinc, una compañía de #USTGlobal, como líder en MSSP… t.co/aJOTaA5835
  • Sep 04
    Cyber security is continuing to grow even in the face of a pandemic, with the need for cloud-related security leadi… t.co/F6N7TPpcyb
  • Sep 03
    RT @cyberproofinc: In yesterday’s live webinar we got together with #cybersecurity experts to discuss how to remain prepared against increa…
  • Sep 03
    In yesterday’s live webinar we got together with #cybersecurity experts to discuss how to remain prepared against i… t.co/xFzHJMfmkF
  • Sep 02
    RT @cyberproofinc: Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process' accor…
  • Sep 02
    Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process'… t.co/jYEqLlgr7D
  • Sep 02
    RT @cyberproofinc: We’re teaming up with with #CyberSecurity experts from @Microsoft on Sept.15th to talk about the evolution of #SOC respo…
  • Sep 01
    ATM manufacturers take action to fix software vulnerabilities after an uptick in deposit forgery attacks.… t.co/679c7fhl59
  • Sep 01
    Cyber incidents could cost Australia as much as $30 billion AUD this year. Learn the best tools to combat… t.co/PLB3NKqmRJ
  • Sep 01
    RT @cyberproofinc: On September 2nd we’re joining security leaders from @USTGlobal and @Microsoft Australia to discuss the best tools and t…
  • Aug 28
    RT @cyberproofinc: Check out this @Forrester Wave™ report as they share their findings on the top midsize #MSSPs to help security professio…
  • Aug 28
    Check out this @Forrester Wave™ report as they share their findings on the top midsize #MSSPs to help security prof… t.co/swhyw9cqzb
  • Aug 26
    RT @cyberproofinc: We are honored to have been named a leader in the new @forrester Wave™ report on #MSSPs. Learn their 26 measuring criter…
  • Aug 26
    RT @cyberproofinc: Take a look at how the #MITRE ATT&CK Framework helps organizations better protect themselves from #CyberAttacks by lever…
  • Aug 26
    Take a look at how the #MITRE ATT&CK Framework helps organizations better protect themselves from #CyberAttacks by… t.co/vTUApYYh4K
  • Aug 25
    COVID-19 has changed the landscape in all realms. Hear from #cybersecurity experts at @cyberproofinc, @USTGlobal an… t.co/wKBG5jf0ZX
  • Aug 24
    Scammers have reached a new low, targeting #SBAs and individuals suffering from financial straits due to #COVID19.… t.co/SGbepyS4Gm
  • Aug 18
    #PerimeterDefense testing often includes its own form of #PenTesting. #SocialEngineering and leveraging weaknesses… t.co/i7XwpTsslI
  • Aug 17
    Congratulations @cyberproofinc for making the shortlist! t.co/ihsBVLOCva
  • Aug 17
    RT @cyberproofinc: Join tomorrow’s #securitywebinar to discover how to improve #SOCefficiency using #AttackSimulations continuously validat…
  • Aug 17
    Join tomorrow’s #securitywebinar to discover how to improve #SOCefficiency using #AttackSimulations continuously va… t.co/3VUkWXLp7z
  • Aug 17
    Our CEO, @TonyVelleca, comments on CyberProof's top marks for ‘Business Value' according to @Forrester's independen… t.co/XZnZ1plegI
  • Aug 15
    RT @cyberproofinc: The highly regarded @Forrester Wave™ report is out. This blog provides some of our key takeaways >> t.co/Ch0rO6C…
  • Aug 14
    @britanalytics2 @cyberproofinc @cyberdefensemag @miliefsky Congratulations!
  • Aug 13
    @cyberproofinc Ranked As A Midsize Managed Security Services Provider (MSSP) Leader By Independent Research Firm… t.co/fPWK2i1S9K
  • Aug 13
    A cloud-native infrastructure provides flexibility, scalability and better #cybersecurity. Here's how our Microsoft… t.co/09In2XMAIW
  • Aug 13
    @cyberproofinc @forrester CyberProof has done it again - yet again we lead the pack in the SOC / MSSP space
  • Aug 12
    Author of #FastPOS pleads guilty to creating the #malware strain designed to infect computers processing payment ca… t.co/V7hFLwfbex
  • Aug 10
    How does the MITRE ATT&CK help create a smarter #SOC? ✔️ #ThreatIntelligence mapping ✔️ Data source gap identificat… t.co/bBQ9HpYl7Z
  • Aug 10
    Billions of #Windows and #Linux users are at risk of persistent compromise due to a bug discovered in the widely us… t.co/1BP1RaJGD2
  • Aug 03
    RT @cyberproofinc: The #MITRE ATT&CK Framework is a powerful #CyberSecurity tool. In this upcoming #SecurityWebinar we shed light on how co…
  • Aug 03
    The #MITRE ATT&CK Framework is a powerful #CyberSecurity tool. In this upcoming #SecurityWebinar we shed light on h… t.co/LhuzNGBkMt
  • Aug 01
    @cyberproofinc 👇 t.co/7Jp251KX1Z
  • Jul 31
    A secure #Perimeter is your first line of #Defense. This is especially true for areas like the server room where se… t.co/OZuSvdvm4Y
  • Jul 31
    #DataBreach monitoring site, Data Viper, has fallen victim to its own worst nightmare. @briankrebs reports on the >… t.co/cUmvEVSf6Z
  • Jul 30
    Our latest @Microsoft partnership provides customers with the ability to ✔️ Seamlessly collate and analyze data ✔️… t.co/9S8hplVUm5
  • Jul 30
    On Aug. 18th we’ll be teaming up with @XMCyber_ for a #cybersecurity #webinar to discuss how you can improve #SOC e… t.co/B3hpTZoAO9
  • Jul 29
    In this blog we provide a recap on the latest @SANSInstitute #MITRE report, exploring the ATT&CK #SecurityFramework… t.co/xKXWgPj8lO
  • Jul 28
    Plugged, the #CyberCrime marketplace discovered by our #ThreatIntel team, is working hard to become one of the most… t.co/d5k0GzmMpc
  • Jul 28
    Another major #DataBreach has been reported, this time affecting millions of LIveAuctioneer customers. @gcluley has… t.co/VorccWvwc2
  • Jul 27
    Join our live #SecurityWebinar on August 10th to discover how you can measure and improve your #CyberDefense using… t.co/pHcATsoMbK
  • Jul 27
    Organizations often invest heavily in multi-layered #SecurityTools - yet struggle to understand their effectiveness… t.co/gbG3fJiSK9
  • Jul 15
    This eBook provides security & risk leaders with guidance on how to spend their money, time and effort on the vulne… t.co/DjtLKUYTLc
  • Jul 15
    #EvilCorp - a notorious #RansomwareGang - is using tried-and-true #CyberAttack tactics to launch new #ransomware,… t.co/EiOzr48JXN
  • Jul 14
    We are delighted to announce our official membership to the Microsoft Intelligent Security Association (MISA). Read… t.co/7FkJFL0XGA
  • Jul 14
    #IoT growth will expand the attack surface on #5G networks exponentially, with a highly complex ecosystem that has… t.co/bs0nUmqZoA
  • Jul 10
    Find out how CyberProof and @SkyboxSecurity are helping businesses reduce #CyberRisks and optimize #SecuritySpend w… t.co/uScrysROEn
  • Jul 10
    Encryption has improved website security and user privacy, however it has also proven to offer #CyberCriminals a ne… t.co/QOf3ajBX0h
  • Jul 08
    Organizations are looking to protect themselves from increasingly sophisticated #CyberAttacks. This blog provides i… t.co/gSJudVJcsJ
  • Jul 07
    Over 1.2 million Stalker Online player records are being offered for sale on the #darkweb. @gcluley reports on how… t.co/juJcTF57It
  • Jun 18
    As one of the fastest growing wireless cellular technologies to date, 5G is causing yet another major shift in the… t.co/vUEaIhHbRp
  • Jun 16
    Breaking: Our #ThreatIntelligence team discovered a new #CyberCrime marketplace, Plugged, using advanced techniques… t.co/gcGh8txTnT
  • Jun 16
    Join us next week to discover how #CISOs can contend with the new normal and the #CyberSecurity challenges that com… t.co/5dOikHQ1PZ
  • Jun 11
    In two recent reports @forrester notes the importance of leveraging #SOAR capabilities and #MSSPs to strengthen… t.co/XItFur7eV7
  • Jun 10
    #TorBrowser has the benefit of anonymity, but it opens organizations to increased #CyberRisks. Here’s how… t.co/mUri7mWoGv
  • Jun 09
    Wondering how #MDR works, day-to-day? Here are key insights on the subject - including how #AI and #ML assists secu… t.co/rUz0SxOBKN
  • Jun 05
    This week we saw a number of security issues affecting Exim MTA servers, as well as attacks exploiting SaltStack vu… t.co/y51jXgXw8h
  • Jun 05
    Why is #TorBrowser a risk for organizations? A quick rundown includes: ⚠️Bypassing network security insider ⚠️Insid… t.co/0SPJbyaRx7
  • Jun 02
    We are excited to share details of our upcoming Virtual Coding Tournament with @SecCodeWarrior. Join us on June 20… t.co/aRrilDw5Wj
  • May 26
    "I believe security should continuously adapt to solve the key challenges of the day. And now is a time of challeng… t.co/CsrSNVwEX9
  • Apr 01
    As you adjust to a new #RemoteWork reality our #CTI team investigates the latest happenings in #CyberCrime communities. This blog identifies #CyberThreats and offers critical advice for keeping  our #CyberHealth resilient. blog.cyberproof.com/blog/new-cyber-security-threat-hackers-take-advantage-of-coronavirus
  • Mar 26
    Organizations are vulnerable to malicious campaigns as #Coronavirus forces us many to quickly adapt to a #WFH environment. These guidelines will help minimize potential #CyberSecurityThreats to your organization. blog.cyberproof.com/blog/cyber-security-risk-assessment-threats-to-remote-workers
  • Mar 17
    Thank you @microfocus for the distinction of South Channel Partner of the Year 2020 at this year's Virtual Universe! #MicroFocus #VirtualUniverse twitter.com/MicroFocusNews/status/1239898083200303104
  • Mar 04
    Seriously, the commitment and devotion of our sponsors to tackle the #cybersecurity workforce and walk the walk of… t.co/vatuKVtOVh
  • Mar 04
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Mar 02
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Feb 25
    En el #CyberSecuritySummit2020, organizado por Esade y @cyberproofinc @USTGlobal_ES, pudimos asistir a interesantes… t.co/cihaK3SRH9
  • Feb 19
    RT @cyberproofinc: Check out our #CyberHub - your place for the latest #cybersecurity news & updates: t.co/iEYTwShTX8
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster I… t.co/NdaT8koQns
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 13
    RT @cyberproofinc: We’re excited to be Diamond Partners in this year’s @CISOPlatform Summit, India’s largest #ITsecurity conference - focus…
Facebook Facebook Follow Us
  • Oct 18
    Studies show that cloud migration is expected to continue being a fast-growing trend at least until 2026.
    For organizations at the beginning stages of digital transformation, it’s imperative to implement the right security tools and processes before starting to make the transition.
    But which tools, and which processes?
    Check out our latest blog written by @Eran Alsheh, CyberProof’s Chief Technology Officer, and learn how to transition your organization to the cloud as safely as possible. https://hubs.ly/H0ZwWwm0
  • Oct 12
    In our recent blog, Aman Malhotra, CyberProof’s Cybersecurity Solutions Architect, explores the ⬆️ increasing number of organizations converging their Information Technology with Operational Technology systems.
    See how building an integrated IT/OT Security Operations Center (SOC) can protect your business against the cyber-attacks 👩‍💻💥🖥️ that can occur if the convergence is not done securely.
    Click here to learn more: https://hubs.ly/H0YGKsb0
  • Oct 05
    Discover our CyberProof Defense Center (CDC) platform and learn how it enables us to deliver next-generation SOC services through smart automation, real-time collaboration and continuous improvement to protect your organization.
    Click here to learn more: https://hubs.ly/H0Yvtlh0
  • Sep 29
    Since our debut in 2018, we've watched CyberProof climb the rankings of MSSP Alert's "Top MSSPs" Report every year. This year is no different, climbing to 19th position out of the 250 MSSPs ranked. Congratulations to the entire CyberProof team for your collaborations providing smarter SOC services to our enterprise clients.
  • Sep 22
    As more businesses are converging their Information Technology and Operational Technology networks, cyber attackers are taking advantage of this transition to prey on new targets. 👩‍💻💥🖥️
    As these threats become increasingly common and sophisticated, targeting weaknesses in converged IT/OT networks, it's essential that your Security Operations Centers (SOC) develop robust strategies to detect 🕵️ and respond to these attacks.
    @Aman Malhotra, CyberProof’s Cybersecurity Solutions Architect, shares how you can best 🛡️protect your organization from these threats. Learn more here: https://hubs.ly/H0XkGl40
  • Sep 15
    A cyberattack in August on T-Mobile reached over 50 million people, exposing their personal information and in many cases their social security numbers. Jonathan Greig’s ZDNet article explores the details of how this happened and what T-Mobile is doing to ensure the safety of its current and potential customers. Read the full story here: https://hubs.ly/H0WZPzL0 #cyberattack #cybersecurity #cybercrime
  • Sep 07
    We’d like to congratulate CyberProof’s Director of Global Service Delivery, Angela Schoeman, for being named one of the “Top 10 Women in Cybersecurity for 2021” at Cyber Defense Magazine's third annual #BlackUnicornAwards! Read about the award here: https://hubs.ly/H0WmPk80
  • Aug 31
    “While infosec experts agree that publicly available proof-of-concept exploits and other information can be weaponized by threat actors, the implications of not sharing information can be far greater.” TechTarget's recent article delves into the burning question of how much transparency is too much after a cyber attack. Click here to get the details on how your organization can be prepared to handle this issue: https://hubs.ly/H0VLW0g0
  • Aug 23
    “In an age where the average data breach costs $3.86 million and companies can reasonably expect to have some level of a distributed workforce, it is critical to take a proactive stance to security and implement a long-term remote security strategy. Failure to do so could have disastrous effects on your business.”
    Threatpost's recent article examines the current state of remote-work cyber security and what needs to be done to create lasting solutions for the growing number of workers working remotely. Click here to learn more: https://hubs.ly/H0TFY-C0
  • Aug 17
    CyberProof’s Use Case Factory was recognized in the Black Unicorn Awards for 2021 in the category of “Top 10 Baby Black Unicorns” – underscoring how our innovative cyber security portfolio provides smarter managed detection & response! Well done, team!
    Click here to learn more: https://hubs.ly/H0TWVBW0
  • Aug 10
    Congrats to CyberProof’s Director of Global Service Delivery, Angela Schoeman, for being named one of the “Top 10 Women in Cybersecurity for 2021” at Cyber Defense Magazine's s third annual #BlackUnicornAwards!
    Read more here: https://hubs.ly/H0TWYQp0
  • Aug 04
    Cyber crime is costing organizations nearly $1.79 million per minute. A recent report by RiskIQ “2021 Evil Internet Minute Report,” uncovered these startling findings and provides information about which organizations have been hit the hardest in the past year. Click here to learn what you can do to avoid future cyber attacks: https://hubs.ly/H0SRW7_0
  • Jul 27
    Why is it important for businesses to start thinking about breached password protection? This article by The Hacker News on breached password detection services provides a helpful look at best practices from leading authorities in cybersecurity. Click here to learn more: https://hubs.ly/H0SRVYX0
  • Jul 20
    Read “4 Tips for Migrating to Microsoft Azure Security Stack” to discover some of the best practices that security professionals should consider as they migrate to cloud security operations, in order to improve threat detection and response processes. Click here to read the blog:
  • Jul 14
    As we emerge from the uncertainty of the past year, cybersecurity risks remain a priority for businesses. Keep your company’s data secure and discover the most important post-pandemic cybersecurity trends. Click here to read the latest article by NETSCOUT’s Chief Solutions Architect, Sanjay Radia: https://hubs.ly/H0R_v6_0
  • Jul 06
    Read our blog by Noa Raz, “Finding the Answers in the Smallest Cracks – a CTI Analyst’s Story,” to discover the fundamental concepts and tools that CTI analysts implement in their intelligence work during the cyber attack investigation process.
  • Jun 29
    We’re happy to share that CyberProof was recognized as a Globee® Winner in the 16th Annual 2021 IT World Awards for “Startup of the Year” category, highlighting the innovative security capabilities that we provide our customers.
    Read more here:
  • Jun 22
    Eager to discover key examples of defense tactics that security teams take to overcome malspam and credential threats? Watch our on-demand webinar “The Inner Workings of Cyber Defenders” here:
  • Jun 15
    Eager to discover your SOC’s level of maturity? Now’s your chance to take our SOC Maturity quiz and receive free recommendations on how to improve your level of security visibility: https://hubs.ly/H0Q7qvz0
  • Jun 08
    We’re delighted to announce that CyberProof’s CEO, Tony Velleca, won “CEO of the Year” at the Global InfoSec Awards 2021. Congratulations!🏆🏆
  • Jun 01
    We’re thrilled to receive the awards of “Cutting Edge in Managed Detection and Response (MDR)” and “Cutting Edge in Managed Security Service Provider (MSSP)” at the 2021 Global InfoSec Awards – recognizing CyberProof’s achievement in providing excellent security solutions! 🏆
  • May 25
    While QR codes are extremely useful for daily payments and are becoming more widespread, users should be aware of their associated cyber security risks, as hackers use them to try to intercept payment transactions and steal personal information. Threatpost has the story here:
  • May 19
    This blog post, “7 Tips to Securing Office 365” by Sinu Peter, details the important techniques that cyber teams should implement as they use Microsoft Office 365 in order to reduce risk. Read the blog here:
  • May 12
    The birthdays, locations, and phone numbers of over 533 million Facebook users has been accessed in a data breach and posted on a hacking forum. This sensitive information can be potentially misused by cyber criminals. Read the story here:
  • May 05
    CNA, a global insurance provider, was recently exposed to a ransomware attack called Phoenix CryptoLocker. The company is in the process of investigating the impact but according to BleepingComputer, CNA aims to restore its systems using backups rather than pay the ransom demanded by attackers.
    Threatpost
    has the details here:
  • Apr 28
    While browser extensions support crucial functions such as password management, users need to be aware of their potential risks and take subsequent precaution. Threat actors utilize browser extensions to conduct malicious attacks and steal private user information. Read more about it in our blog:
  • Apr 20
    As cyber breaches are on the rise, organizations are highly encouraged to strengthen their cyber security implementation and to provide continuous employee training in an effort to prevent the risk of malicious attacks. Read the article by
    Forbes
    here:
  • Apr 14
    As cyber breaches are on the rise, organizations are highly encouraged to strengthen their cyber security implementation and to provide continuous employee training in an effort to prevent the risk of malicious attacks. Read the article by
    Forbes
    here:
  • Apr 07
    Hospitals are continuously subjected to ransomware attacks, which are compromising healthcare and treatment quality. ZDNet details the impact on patients and the healthcare industry in this article:
  • Apr 01
    Are you ready for our upcoming webinar? On April 13, 2021 at 12:00 GMT | 13:00 CET our cyber experts will dive into the fundamental considerations for Financial Services organizations, as they increasingly adapt innovative technologies that can increase their security vulnerabilities.
  • Mar 23
    We’re pleased to announce that CyberProof’s CTI team has been awarded for Customer Service and Support Team of the year in the 17th Annual 2021 Cyber Security Global Excellence Awards. This award demonstrates the enhanced collaboration capabilities and threat identification processes of our CTI team! 🏅
  • Mar 16
    Maayan Cohen Haziz, CyberProof’s Global Director of Human Resources, shares some key characteristics that are considered by CyberProof when recruiting new employees. Read the blog here:
  • Mar 09
    In this blog, Saggie Haim, CyberProof's Cloud Security Solution Architect, discusses the process needed to conduct a successful deployment of Azure Sentinel in a multi-tenancy environment. Click here to read more:
  • Mar 03
    Interested in learning about how the CyberProof Log Collection provides a highly scalable and resilient solution to cyber security challenges? Read about it in this blog by CyberProof’s Omri Pinsker:
  • Feb 23
    Avanan has recently published a report demonstrating how managing email threats is a major time-consuming task as SOC teams handle potential email threats for 2 to 3 hours daily. Read the full article here:
  • Feb 17
    CyberProof’s Head of SIEM Solutions Omri Pinsker details how to uphold the secure infrastructure of your organization by creating Alert Rules in Azure Sentinel SIEM that search for targeted threats across your environment. Click here to read the full blog https://hubs.ly/H0GzP3-0
  • Feb 09
    In the 1st of this 2-part blog, you will learn how to plan a successful deployment of Azure Sentinel so it can be managed in a multi-tenancy environment with Azure Lighthouse.
  • Feb 03
    According to Forrester’s MSSP Wave report, CyberProof has been distinguished for excellence in “Threat Intelligence,” a noteworthy accomplishment as we link between nation-state level threat intelligence and advanced security operations.
  • Jan 27
    An effective cyber defense infrastructure calls for the right security technologies. In this blog, we’ll compare SIEM and EDR solutions and discuss when they are most relevant for your organization: https://hubs.ly/H0DqHTF0
  • Jan 20
    With the massive increase in malware and ransomware attacks in 2020, comes the demand for increased cyber awareness. Read
    the Threatpost
    article about the surge in inbox spam and malware over 2020 and how to stay secure in 2021:
  • Jan 13
    SOC teams are currently faced with the need to scale-up their incident monitoring capabilities, especially as online fraud is on the rise. Learn how security teams within FS organizations can augment their internal capabilities in our new eBook: https://hubs.ly/H0D309D0
  • Dec 17
    Private data about Canon employees has been accessed after the corporation was exposed to a cyber attack in August 2020. According to Canon, cyber criminals managed to steal 10TB of data, as unauthorized activity was detected on their network between July 20 and August 6.
    TechRadar
    details the story here:
  • Dec 16
    How does the MITRE ATT&CK Framework enable organizations to better protect themselves from cyber threats? Read how in this post by CyberProof’s Chief Technology Officer and Cyber Visionary, Eran Alsheh:
  • Dec 15
    Turn common #CyberSecurity challenges into opportunities by integrating automation and #AI into your #SOC, creating a more efficient #ThreatIntelligence program. Start conquering your hurdles today.
  • Dec 14
    Cyber attackers demand a $10.9 million ransom after exposing Portuguese energy corporation, Energias de Portugal (EDP), to a critical malware attack. 10TB worth of company information was threatened to be leaked. Click here to read more:
  • Dec 10
    Cryptocurrency trading platforms, NiceHash and Liquid, have been subjected to malicious activity, after threat actors managed to gain control of their domain names. Malicious actors managed to mislead GoDaddy employees to pass on control of domain names. Read the details here:
  • Dec 09
    As the #Tor browser increasingly poses security risks to businesses, such as exposing corporate networks to malware infections, organizations are highly encouraged to understand how to detect and prevent its negative impact. Click here to read about how to detect the use of #tor browser:
  • Dec 08
    Unsecured wifi and weak network safety are some of the few risks posed to companies facing a remote reality. The following article lists effective guidelines to promote company safety and reduce #cyberthreats.
  • Dec 03
    Effective steps need to be taken in order to protect sensitive company data as employees continue to be targeted by cyber criminals while working from home. Learn more about how you can elevate cyber protection and reduce potential threats by maintaining a safe WFH workplace.
  • Dec 02
    Gartner is calling the upcoming period “a digital-first 2020 holiday season” with dramatic increases in online purchases. As a result, retailers need to take additional precautionary measures to prevent cyber attacks. Read more about the considerations that should be implemented by retailers this holiday season:
  • Nov 30
    Can an integration between CyberProof and
    Microsoft Azure
    help your organization overcome common security challenges? CyberProof’s Ben Chant, examines the advanced security capabilities provided by this integration, and details the key points you can implement to build a #SmarterSOC:
  • Nov 25
    Cyber criminals are sharing #cyberattack methods on the dark web, increasing their #cyberthreats as they take their activity to the larger #hacking community: >> https://hubs.ly/H0zv21_0
  • Nov 23
    At the recent Chinese hacking competition, the Tianfu Cup, 11 targets were successfully hacked. Some of their targets included Chrome, Safari, FireFox, and Adobe PDF Reader. Read about the story here:
  • Nov 19
    Cyber criminals are looking for new ways to exploit retailer and consumer security weaknesses this holiday season. As holiday shopping continues to shift towards online, measures need to be taken to ensure transactions are secure and personal data does not get into the wrong hands. The following blog details the most important steps needed to reduce #cyberthreats.
  • Nov 18
    Reduced alert fatigue, 24x7 security monitoring, and high-context alerts are some of the many services that your organization can benefit from with
    Microsoft Azure
    and CyberProof’s new integration. Learn more about it here:
  • Nov 16
    Learn more in this blog about the most common #cyberattack techniques used by #cybercriminals in 2020 so far:
  • Nov 09
    Security breaches are rising as Barnes and Noble’s network has been recently accessed by hackers. As a result private customer information has been exposed, including billing and shipping addresses, email addresses, and telephone numbers. The booksellers’ system is in a state of uncertainty as they attempt to return online. Read more about it here:
  • Nov 08
    Register today to our live webinar as part of BrightTalk’s 2021 Threatscape Summit on November 12, to hear about how companies can leverage an agile detection and response framework as a preventative security measure and promote smarter security operations.
  • Nov 06
    Cyber security professionals must act with extra caution as the @NSA has issued a list of 25 vulnerabilities targeted by Chinese #cyber offenders. The NSA is encouraging cyber security teams to perform CVE patching in the NSA advisory. Read in full detail about the NSA’s direction to handle this threat in the following
    SC Media
    article.
  • Nov 04
    With the approval from a court in Virginia,
    Microsoft
    has been granted authority to perform an attack on #Trickbot, a malware-as-a-service that has increasingly become a threat to the company. However, it is yet to be determined whether the operation has been performed successfully.
  • Nov 02
    As the US government and its citizens have gained more awareness of the potential online security risks in the upcoming 2020 presidential election, #cyberattacks and disinformation campaigns are on the rise. These cyber security threats call for the prevention of false news spread. Read the details here:
  • Oct 29
    We appreciate the dedicated time and effort that are remarkable speakers have placed to make the #virtual event so special. A huge thank you to Tamir Pardo, Tony Velleca, Ann Johnson, Yuval Wollman, Sean Keef, Sinu Peter, Bruce Roton, Doug Saylors, Lior Suchard, Samantha Rule, Dave Row, and Adrian Bisaz!
  • Oct 28
    Thank you to all of our #SmarterSOC event attendees who made this event a success and joined us as we heard from industry professionals about security challenges that are currently facing #security operations.
  • Oct 26
    A #cybercrime marketplace named Plugged has been discovered by our #threatintel team. Plugged is aiming to grow as a prominent marketplace in the cybercrime community by using various #carding scams. Read more in the following article:
  • Oct 22
    CyberProof has been recognized in
    Forrester
    's latest NowTech Report as a leading “pure-play provider” - a category known for its high level of #cybersecurity expertise, remote multi-tenant monitoring, product flexibility and more. Check out the key takeaways here: https://hubs.ly/H0xQ8ML0
  • Oct 20
    Register for the upcoming #SmarterSOC Summit where
    Information Services Group (ISG)
    Cyber Security Director Doug Saylors and
    CyberProof
    CEO Tony Velleca, will dive into the significance of adopting a hybrid engagement model for #securityoperations
  • Oct 19
    The potential devastation of #CyberAttacks and the importance of the right #CyberSecurity tools to build a #smarterSOC is vital to stay protected from increasingly sophisticated #cyberthreat. https://hubs.ly/H0xvfwG0
  • Oct 15
    Yuval Wollman, President of
    CyberProof
    discusses why you should join him and
    Microsoft
    VP of Security & Compliance, Ann Johnson as they examine modernizing and scaling your security in the cloud at the upcoming Smarter SOC Summit. Registration is live here!
  • Oct 14
    Register today to The Smarter SOC Summit on October 27th where you will hear about the most relevant security challenges facing your security operations today. Keynotes, fireside chats, and breakout sessions will be led by cyber security experts, where you will learn how uncertainty has, and will continue to share 2021 cyber security strategies.
    Check out the details and register here.
  • Oct 13
    Forrester
    has just released the Now Tech report for Asia Pacific, helping organizations understand the value they can expect from #MSSPs. Take a look at the key takeaways here: https://hubs.ly/H0xQ8MM0
  • Oct 09
    During a period of uncertainty where global dangerous ploys of fake news spread, the
    World Health Organization (WHO)
    has named this an #infodemic. Our Senior SOC Analyst, Fabio Lior Rahamim highlights 8 tips to identify false information here:
  • Oct 07
    We teamed up with #CyberSecurity experts from
    Microsoft
    to discuss the evolution of #SOC responsibilities, and the key attributes to building a #smarterSOC. Watch it now >> https://hubs.ly/H0xv3l80
  • Oct 01
    While security needs have grown, budgets have not. CISOs have the challenge of maintaining a strong level of #cybersecurity in a time of pandemic. In this blog we review our top 5 tips for #CISOs to help them continue to combat risk within budget.
  • Sep 27
    Triggered by an uptick in deposit forgery attacks, ATM manufacturers take action to fix software vulnerabilities that allowed attackers to forge the amount of money being deposited - followed by illegal cash withdrawals. Read on to learn more: https://hubs.ly/H0v8KvQ0
  • Sep 23
    Pandemic has caused cyber threats to rise and budgets to fall. Learn how #CISOs can combat their #cyberthreats effectively amidst #cybersecurity budget constraints in this blog:
  • Sep 21
    As #CyberAttacks and threats become more sophisticated, the tools to combat them need to advance as well. In this blog, we talk about the potential devastation of #CyberAttacks and the importance of the right #CyberSecurity tools to build a #smarterSOC. https://hubs.ly/H0vmhrz0
  • Sep 17
    MITRE, creator of the ATT&CK Framework, has introduced a new #CyberDefense resource called“Shield”.
    SecurityWeek.Com
    explains how the #MITREShield - a continuously evolving tool - will help organizations strengthen their active defense solutions.
  • Sep 15
    According to a recent survey in the #cybersecurity industry, about 67% of #securitybudgets stayed the same, or slimmed down, in the last six months. With threats rising, enterprises need to be able to manage their risks while remaining within a budget. Learn the top 5 tips for #CISOs to make this happen, here: https://hubs.ly/H0w9sPx0
  • Sep 11
    It’s more critical than ever to extend #MDR capabilities into the cloud—but how can you ensure the inevitable complexities won’t overburden your #SOC team? Join these #CyberSecurity on Sept. 15th to learn how >> https://hubs.ly/H0vkPF60
  • Sep 09
    We’re teaming up with with #CyberSecurity experts from
    Microsoft
    on Sept. 15th to talk about the evolution of #SOC responsibilities, and the key attributes to building a #smarterSOC. Register now >> https://hubs.ly/H0vkNJr0
  • Sep 08
    A new #CyberThreat has come to light - scamming those receiving government funds during #COVID_19. This blog explains how scammers are selling and sharing details on anonymous forums to siphon the money intended for people who’ve suffered great financial loss due to the pandemic: https://hubs.ly/H0v8q9N0
  • Aug 31
    Join us on September 2nd, as we get together with #cybersecurity leaders from
    Microsoft
    and
    UST Global
    to talk about:
    ⚠️The new threat landscape from COVID-19
    ⚠️Top automation tools to stay prepared
    ⚠️The importance of #data analytics
    And more!
    Followed by a Q&A session. Register now >>> https://hubs.ly/H0tRnCF0
     
  • Aug 27
    The Forrester Wave™ report evaluates 26 criteria when determining the top midsized MSSPs, with CyberProof receiving the highest score possible in 17 out of 26 criteria. Read the report to learn what we think differentiates us from the rest: https://hubs.ly/H0tGL0t0  
  • Aug 26
    At CyberProof, we’re thrilled to have been recognized by Forrester as a Leader in #managedsecurityservices. Take a look at our key takeaways from their latest #MSSP Wave™ Report, and how we think we’ve differentiated ourselves from the competition here: https://hubs.ly/H0txFvK0
  • Aug 20
    With this year’s overwhelming number of quality entrants into the 2020 American Cyber Awards it is an honor to have made the shortlist for Best Security Company of the Year! Check out the full list of finalists here: https://hubs.ly/H0tSwVj0
  • Aug 19
    Our CEO, Tony Velleca, comments on CyberProof's top marks for ‘Business Value' according to Forrester's independent evaluation of the top midsize #MSSPs. https://hubs.ly/H0tGLg40
  • Aug 17
    Yuval Wollman, President of CyberProof, comments on our top marks in ‘Delivery Model Strategy' according to Forrester's independent evaluation of the top midsize #MSSPs. hubs.ly/H0tGLgs0
  • Aug 14
    As security threats become increasingly sophisticated and highly targeted, organizations must expand detection coverage to rapidly contain and eradicate validated #CyberThreats. Join our upcoming #SecurityWebinar to learn how to use #AttackSimulations to continuously validate and remediate risks as they emerge. hubs.ly/H0t4dgg0
  • Aug 13
    What does our membership with Microsoft Intelligent Security Association (MISA) offer security teams? By integrating the CyberProof Defense Center with Microsoft Azure, security teams can use their existing investments in security and cloud applications at scale while lowering costs. Read this Press Release to learn more: hubs.ly/H0svGk30
  • Aug 12
    The word is out - we’ve been named a leader of midsize MSSPs! Know the top 26 criteria Forrester uses to determine #MSSP leaders in this independent report, which we are thrilled to be included in: hubs.ly/H0txBN20
  • Aug 05
    #BadActors are getting more sophisticated, and younger than ever … Tampa Bay Times shares how a 17-year-old from Tampa accessed high-profile accounts with millions of followers using a #spearphishing attack technique: hubs.ly/H0tfLCS0
  • Aug 04
    Struggling to understand how you can continuously refine your #CyberDefense to keep up with emerging threats? On Aug. 18, CyberProof’s Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how organizations can use #AttackSimulations to improve #SOCefficiency. Save your spot in this upcoming webinar here: hubs.ly/H0t4bgr0
  • Aug 03
    Join our live #SecurityWebinar on August 10th to discover how you can measure and improve your #CyberDefense using the #MITRE ATT&CK Framework - register now! hubs.ly/H0sM_1g0
  • Jul 31
    A closely interwoven #cybersecurity ecosystem is in high demand, encouraging the Microsoft Intelligent Security Association to grow - and we’re excited to be a part of it! Microsoft customers are now be able to take advantage of our cloud-native, next-generation #ManagedSecurity services through the Microsoft Azure Marketplace: hubs.ly/H0sJ1M80
  • Jun 29
    As organizations slowly return to the “old normal” security leaders are reviewing what #CyberSecurity measures have been put in place in the last few months – and evaluating #ProactiveSecurity measures to minimize #CyberThreats and risks. This blog will help you get started with a basic list of #SecurityTips: https://hubs.ly/H0rnXTd0
  • May 30
    Using #DF this airline discovered the details of how a highly sophisticated #hack compromised millions of customers' personal data. Forbes reports on what the airline’s CEO has to say about the #CyberAttack, as well as precautionary measures its customers should be taking. hubs.ly/H0q-csg0
  • Mar 30
    There’s no question that #ThreatIntelligence is a crucial piece of #CyberSecurity. But how do you know where, when, what and with whom to start? The answer is here - with the ultimate guide to #ManagedThreatIntelligence >> https://www.cyberproof.com/managed-threat-intelligence/
  • Mar 25
    In the past week, there has been a spike of #SpearPhishing attacks as well as new VPN threats around Coronavirus. Our #CyberHub is keeping a close on these, as well as providing updates on new capabilities of the infamous trojan #Trickbot #EternalDarkness and #Phishing campaigns as an attack vector on organizations: https://www.cyberproof.com/cyber-hub/
  • Mar 19
    Big thanks to Hen Porcilan for offering insights on streamlining responses against #cyberattacks in yesterday's #SecurityWebinar. In case you missed it or would like to review, you can check it out on-demand here: https://go.cyberproof.com/webinar-streamlining-your-response-to-cyber-attacks
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, #CyberInsiderThreats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a #CyberSecurity program for #InsiderThreat identification and remediation: https://hubs.ly/H0nc2h30
  • Mar 10
    Up to date with your security operations? Confident in dealing with #cybersecurity issues? Fear not, CyberProof’s own Senior Security Analyst, Hen Porcilan is hosting a webinar on March 18th, providing tips on how to streamline responses against #cyberattacks leveraging advanced SOC technology. Join us: https://hubs.ly/H0n515h0
  • Mar 05
    In the wake of increasingly sophisticated #CyberThreats, the pressure on enterprise security teams intensifies. Rather than trying to outpace the explosion of #CyberSecurity alerts by constantly hiring more analysts for your #SOCteam#SecurityAutomation services allow SOCs to scale in several key ways. Our CEO, Tony Velleca, explains how on our blog >> https://hubs.ly/H0nh_3p0
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 21
    We're heading to Bangalore to join CISOs from around the world for two days of peer learning and networking, with a focus on how to make the world a safer place by making better security buying decisions. Meet us at the CISO Platform Summit >> https://hubs.ly/H0m_sSH0
  • Feb 19
    With concerns rising over online #dataprofiling #IoTdevices #facialrecognition software and more… data and digital #privacylaws are at the center of core issues for governments to address. @ITSecGuruNews provides an overview of the #dataprivacy landscape and what's coming for 2020 >> https://hubs.ly/H0mZrdk0
  • Feb 18
    Ready to build an effective Intruder Hunting Program? Join us today for part 2 of our webinar series our VP and Global Head of Customer Success, Bruce A. Roton will explore the following: ☑️ How to identify what you are looking for ☑️ How to select and use the tools at your disposal ☑️ How to build an Intrusion Sensor Array ☑️ The fundamentals of data collection and analysis for use in intruder detection ☑️ Creating an integrated security and risk management architecture
    Sign up for part 2 of this expert security series today to join the conversation >> https://hubs.ly/H0n2zFQ0 Missed part 1? Get it on demand here >> https://hubs.ly/H0n2zl60 #intruderhunting #intruderdetection #securitywebinar #proactivecybersecurity #cybersecurity
  • Feb 17
    We already know not to believe everything we read online, but what about what we see? The lines of reality are being blurred more than ever as #cybercriminals continue to break the truth-barrier with #deepfake videos being created #IRT. https://hubs.ly/H0mZrcp0
  • Feb 14
    Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to date on the next one? Check out our #CyberHub for the latest updates on events, meetups, webinars, and more. https://hubs.ly/H0m_jLs0
  • Feb 13
    If you already have a technical background in #cybersecurity and are looking to delve deeper into the processes of developing an effective #intruderhunting program, this #securitywebinar is for you! Join CyberProof's VP and Global Head of Customer Success, Bruce A. Roton on Feb 20th and gain expert insights into intruder detection, eviction, and remediation >> https://hubs.ly/H0mNCvB0
  • Feb 11
    #Cybersecurity today needs to go beyond playing the defensive to stay ahead of the game. See how CyberProof is bringing #securityservices to the next level with a combination of #automation and #HUMINThttps://hubs.ly/H0mNwwx0
  • Feb 06
    Download our #securityebook to learn about the issues facing today’s #SOC – and how #AI and automation can help organizations stay safe and resilient. https://hubs.ly/H0mSWk50
  • Feb 05
    When it comes to #cyberattacks, the question is not IF but rather WHEN? In part 1 of our intruder hunting #securitywebinar series, we discussed why proactive #intruderhunting is vital to your #cybersecurity strategy. In our upcoming webinar, we'll delve deeper into the processes of building an effective intruder detection program. https://hubs.ly/H0mNHyz0
  • Feb 03
    Huge shout out to our Threat Intelligence Team Leader, Orel Pery, who inspired hundreds of cyber tech leaders at Hackplayers #hc0n2020 with her presentation on getting inside a hackers mindset from the perspective of an analyst - and the connection between the two.
  • Jan 30
    At CyberProof #cybersecurity and #threatintelligence are much more than a day job, it's part of our DNA. Take a couple of minutes (2:17 to be exact) to meet the experts behind CyberProof and see how we transform #securityoperations >> https://hubs.ly/H0mNHFv0
  • Jan 24
    #usecasefactory in your #cybersecuritystrategy is vital for mitigating risks and minimizing damage to an organization. Part 2 of this blog series takes a closer look at the process of identification, validation, development, and operation of a use case: https://hubs.ly/H0mzl9h0 #riskassessment #proactivedefense
  • Jan 23
    We're excited to take part in making this year's #RSAC the best yet, with the launch of The Update Box. A platform that offers RSA attendees the opportunity to optimize their #RSAC2020 experience with real-time info on the best talks, vendor announcements, and press. Check it out here: https://hubs.ly/H0mHYFV0
  • Jan 15
    The tables have turned on ring camera doorbells. @SCMag shares the details on how #hackers are gaining control of them and why the need for #IoT #security should be taken very seriously as we venture further into #digitalisation. hubs.ly/H0mpsNP0
  • Jan 14
    In part 1 of this blog series, we discussed how building a #usecase package requires specific skills – now we're delving deeper into the development process for a #usecasefactory. Let's take a closer look >> hubs.ly/H0mzjYk0 << #cybersecurity #proactivecybersecurity
  • Jan 10
    What will 2020 bring to the world of #cybersecurity as #IoT continues to evolve? #Privacyprotection is on the top of the list as the #publicdomain as the demand for manufacturers to produce low-cost, integrated devices grows. hubs.ly/H0mpqVt0
  • Jan 06
    #ThreatHunting is an art form of sorts. It requires actively looking for signs of malicious activity within enterprise networks, but without prior knowledge of those signs - and for that, the key to success is the expertise of your #securityteam. hubs.ly/H0mg1Gj0
  • Jan 03
    Join part 1 of our upcoming #securitywebinar series on Jan 14th, to learn about the resources and functional components required for effective #IntruderHunting. Then, keep an eye out for Part 2 where we'll delve deeper into the issues and processes of #intruderdetection, from first response through intruder eviction and remediation.
  • Jan 01
    The attack surface has expanded in tandem with the spread of #COVID19. In this #LiveWebinar, CyberProof India’s Head of Cyber Security Business, will discuss the scope of how the pandemic has affected Indian enterprises - and how #CISOs can respond to new security challenges. hubs.ly/H0pW2MY0
Upcoming Events
  • November 2 - 3, 2021

    2021 SOC Masterclass

    This two-day virtual event is designed to upskill and inspire security operations leaders who are building or optimizing their own Security Operations Center (SOC). The Masterclass is designed to pass on the latest knowledge and bring existing and emerging SOC leaders together, providing a unique opportunity to share information and network. You'll hear from the experts and gain insight from CyberProof's highly experienced team and industry influencers. You'll also get the opportunity to test your learning in our breakout activity groups, where you'll work with peers on a short simulated task.

  • November 10 - 13, 2021

    c0c0n 2021

Webinars
  • CISO Talks: Threat Detection and Response Strategy

    How should CISOs be approaching their threat detection and response strategy? Join >

  • A Roadmap to a Converged IT-OT SOC

    Understand how the SOC will need to adapt their processes to OT-related environments. Join >

  • Migrating from On-prem. to Microsoft Azure

    We’ll discuss the key considerations when adopting a cloud-native SOC with Microsoft. Join >

  • How to Detect and Respond to Ransomware

    In 2021, there has been a notable increase in Ransomware attacks against businesses across all sectors. Join >

  • Security Operations in the Finance Sector

    How the Finance industry are facing targeted threats on a daily basis, even from nation-state threat actors Join >

  • On Demand: Getting the most from your EDR technology

    The capabilities of EDR technology and its importance on your security infrastructure. Join >

  • On Demand: The Inner Workings of Cyber Defenders

    The positive impact of collaboration between cyber defense teams on mitigating security threats in a variety of situations. Join >

  • On Demand: Visibility Into the Vulnerabilities That Matter