Cyber Hub

Your Place for the Latest CyberProof Updates
Latest Reports
  • 14-Sep-2020

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Active_Directory , Attachment , Emotet , Office365 , Outlook , Phishing , TA542 , Trojan
    Label: Threat Advisory
    Threat Level: High

    Phishing continues to be the most common infection vector for launching large-scale cyber campaigns. To keep this attack effective, threat actors come up with new ways to perform phishing or to improve the methods they are utilizing. This past week, hackers launched an Office 365 phishing campaign that validates the stolen credentials in real time. Threat actors also launched a phishing campaign that impersonates the technical support team of the victim’s organization. It uses messages about quarantined emails that include a link to a phishing website, which is uniquely designed to look like it belongs to the employee’s company. In addition, the French government warned its citizens this week against an increase in phishing emails delivering the Emotet Trojan to French targets in the private and public sectors.

  • 14-Sep-2020

    Latest Reports of Recent Malware Campaigns

    Tags: ADFind , Anydesk , Artech , Bloodhound , Cobalt_Strike , CVE-2015-1701 , CVE-2017-0213 , CVE-2019-0859 , CVE-2019-11510 , CVE-2019-1458 , CVE-2019-18935 , CVE-2020-0796 , DLL_Hijacking , Equinix , LaZagne , Mimidogz , Mimikatz , Mimikittenz , netwalker , Network_Scanner , NLBrute , Office_365 , PowerShell , ProLock , PsExec , Pulse_Secure , Pwdump , PyXie , Qbot , RaaS , Rainmeter , RansomEXX , Ransomware , Rclone , RDP , REVIL , SMBGhost , Sodinokibi , SoftPerfect , SoftServe , Source_Code_Leak , TeamViewer , Telerik , Tomcat , VBA , VBScripts , WebLogic , Windows_Credentials_Editor , Zeppelin
    Label: Threat Advisory
    Threat Level: High

    Over the past week, the CyberProof CTI team kept track of ongoing developments and modifications of known and new variants of ransomware. Many campaigns of major ransomware operations targeted large companies internationally, such as Equinix and SoftServe, which provide IT services to many companies around the world. Moreover, the ProLock and Zeppelin ransomware have upgraded their capabilities and are demanding an increased ransom rate.

  • 14-Sep-2020

    Latest Reports of New and Critical Vulnerabilities

    Tags: Bluetooth , BLURtooth , CTKD , CVE-2020-15802 , Microsoft , MitM , NTLM , Pass_the_Hash , Phishing , Social_Engineering , Theme_files , Vulnerability , Windows
    Label: Threat Advisory
    Threat Level: High

    Over the past week, security researchers disclosed a new vulnerability dubbed BLURtooth – which might be used to conduct Man-in-the-Middle (MitM) attacks against Bluetooth-supporting devices. In addition, researchers discovered that a flaw in Windows theme files can be leveraged by threat actors to harvest Windows credentials.

  • 07-Sep-2020

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Attachment , AveMaria , Botnet , Cobalt_Strike , Credentials , Crypter , Emotet , Google_Drive , Gozi , ISFB , Link , Microsoft_Office_365 , Oski , Overlay , PDF , Phishing , Qbot , Salfram , SmokeLoader , Social_Engineering , Ursnif , Windows_10_Mobile , Zloader
    Label: Threat Advisory
    Threat Level: High

    Many new campaigns that leverage phishing as an attack vector have been identified throughout the last week. As reported in the previous weekly report, massive campaigns of Emotet and Qbot have been launched worldwide. Other phishing campaigns used sophisticated techniques to avoid detection in order to spread malware or steal credentials. In a new campaign called Safram, threat actors used the contact forms that appear on organizations’ websites to send links that host obfuscated malware binaries – while another campaign used email quarantine messages, in an attempt to steal credentials.

  • 07-Sep-2020

    Latest Developments on Major Ransomware Campaigns

    Tags: AESMewLocker , AIDS NT 2020 , Crypter , Cyrat , Dharma , DLL_fixer , Fernet , HiddenTear , LogicalDuckBill , PowGoop , RaaS , Ransomware , Thanos , Z3enc
    Label: Threat Advisory
    Threat Level: High

    Over the past week, the CyberProof CTI team kept track of ongoing developments and modifications of known and new variants of ransomware. Several new types of ransomware were discovered, in addition to new variants of known types of ransomware. Moreover, researchers found a new ransomware dubbed Cyrat disguised as a DLL fixer, and a new destructive variant of Thanos ransomware.

  • 07-Sep-2020

    Latest Reports of Recent Malware Campaigns

    Tags: AgentTesla , Azorult , DNS_Over_HTTPS , Epic_Manchego , EPPlus , Evilnum , Formbook , Golden_Chickens , Info_Stealer , LNK_file , MaaS , Matiex , njrat , OOXML , Pyvil_RAT , Spear-phishing , VBA_code
    Label: Threat Advisory
    Threat Level: High

    Over the past week, several malware campaigns exposed new developments and capabilities, that improve their ability to avoid detection and allow them to cause greater damage to the infected victims. A new operation called Epic Manchego was observed leveraging EPPlus to create malicious Office documents that evade detection. Researchers also identified the notorious Evilnum group using a new Python-based RAT. In addition, researchers analyzed a new evasion technique which abused DNS over HTTPS to retrieve the final payload.

  • 31-Aug-2020

    Recent Phishing Campaigns Targeting Organizations Around the World

    Tags: Attachment , Emotet , Malware , Outlook , Phishing , Qbot , Red_Dawn
    Label: Threat Advisory
    Threat Level: High

    Two major malware families known for their powerful phishing campaigns saw an upgrade in their distribution vectors this past week. Emotet released a new template for malicious attachments, and Qbot Trojan acquired the capability of hijacking legitimate email threads to propagate further.

  • 31-Aug-2020

    Latest Developments on Major Ransomware Campaigns

    Tags: Advanced_Port_Scanner , Avaddon , Conti , CVE-2017-0213 , Dharma , Iran , Masscan , Maze , NLBrute , Ransomware , RDP , Ryuk , SunCrypt , TrickBot
    Label: Threat Advisory
    Threat Level: High

    Over the past week, new developments in the ransomware landscape were observed. Since ransomware is one of the most significant threats that organizations need to prevent, the CyberProof CTI team constantly reviews reports about new strains of ransomware and enhancements of types of ransomware that are already known. This week, a new type of ransomware called SunCrypt joined the cartel of Maze ransomware, for assisting the Maze group with running their operations. In addition, a script kiddies group from Iran deployed Dharma ransomware – in order to earn money. This is unusual behavior for Iranian threat actors as usually the Iranian groups are focused on espionage or sabotage operations. Furthermore, Conti ransomware, a successor of Ryuk, joined the trend of establishing data leak sites, which are designed to put pressure on their victims.

  • 31-Aug-2020

    Latest Reports of Recent Malware Campaigns

    Tags: COVID-19 , cryptominer , CVE-2017-8570 , CVE-2020-0796 , Dead_Drop_Resolver , DeathStalker , EternalBlue , Evilnum , Hadoop , Janicab , Lemon_Duck , Linux , Malware , PowerShell , Powersing , Redis , SMBGhost , XMRig
    Label: Threat Advisory
    Threat Level: High

    This week, researchers observed two major campaigns that deliver advanced malware variants. In both cases, the payload in use is not new; rather, in one case researchers have been able to identify features that may be associated with malware samples from 2012. The two campaigns demonstrate how attackers use and rely on a known, well-built framework, and work to maintain and improve it. One campaign portrays how decade-old techniques can be adjusted to meet the needs of an ongoing malspam campaign. The other uses a cryptominer variant updated with a new capability to target Linux-based systems.

  • 24-Aug-2020

    Powerful Botnets Show New, Sophisticated Capabilities

    Tags: AWS , Botnet , Credentials , Cryptomining , DDos , Docker , FritzFrog , Golang , Kubernetes , Linux , Lucifer , Mimikatz , Monero , P2P , PoweShell , SSH , TeamTNT , Worm , XMRig
    Label: Threat Advisory
    Threat Level: High

    In the past week, several botnets have been identified being used mainly for cryptomining and DDoS. The botnets show sophistication in their model of operation and new capabilities added to enhance their footprint. A relatively new botnet associated with the TeamTNT group is the first ever botnet that is capable of collecting AWS credentials while the Lucifer botnet has begun targeting Linux systems and adds new Windows-related capabilities. Another newly discovered P2P botnet named FritzFrog has breached more than 500 SSH servers using its powerful P2P implementation.

Linkedin Linkedin Follow Us
  • Oct 09
    The continuous global spread of fake news has been considered a worldwide “infodemic” in recent months. The following blog from our Senior SOC Analyst, Fabio Lior Rahamim details how to identify and prevent the spread of misinformation. https://hubs.li/H0xxyzZ0 #infodemic #FakeNews #FakeCoronavirusNews
  • Oct 08
    Wondering about the evolution of SOC responsibilities? Check out what Sinu Peter, Ben Chant, and Cyril Voisin had to say in this webinar, available on-demand here >>> https://hubs.li/H0xv2ns0
  • Oct 05
    A Bluetooth bug opens devices to a vulnerability that could allow hackers to intercept and manipulate data from hundreds of feet away. ZDNet provides guidance on how to protect against BLURtooth attacks here: https://hubs.li/H0whPJs0
  • Sep 29
    A Bluetooth bug opens devices to a vulnerability that could allow hackers to intercept and manipulate data from hundreds of feet away. ZDNet provides guidance on how to protect against BLURtooth attacks here: https://hubs.li/H0whPJs0
     
  • Sep 26
    Adobe has released security updates addressing multiple vulnerabilities for Adobe InDesign, Framemaker and Experience Manager that if gone unfixed could allow an attacker to run malicious Javascript on a victim’s machine. SC Media reports: https://hubs.li/H0whGcV0
     
  • Sep 25
    Congratulations to CyberProof’s CTO Eran Alshech for being awarded CTO of the year by 15th Annual Network PG’s 2020 IT World Awards! Eran was recognized as the gold winner under the ‘Chief Technology Officer of the Year, Security Services’ category, for ‘Designing cybersecurity service framework based on the Use Case Factory’. Judges from a broad spectrum of industry voices from around the world participated and their average scores and inputs determined the 2020 award winners. For a complete list of the 2020 IT World Award winners, visit https://lnkd.in/djHSdv5
  • Sep 21
    A serious cyber incident has the potential cost the Australian economy as much as $30 billion AUD. In this blog we review the need for country-wide cyber security practices and advancements. https://hubs.li/H0vmqFF0
  • Sep 17
    Wishing a happy, healthy, sweet and secure new year to those celebrating Rosh Hashana. If you're not celebrating, we still wish you health, happiness, sweetness and security!
  • Sep 16
    Congratulations Anand Trivedi for your nomination to be part of the Confederation of Indian Industry's committee on Insurance and Pension!
  • Sep 15
    As the U.S government looks to help citizens in financial distress due to the pandemic, a new cyber threat has surfaced - intercepting relief funds and loans from the unemployed, small business owners, and more. Read about it here: https://hubs.li/H0v8wgR0 #COVID-19 #CyberThreat #CyberScheming #GovernmentRelief
  • Sep 10
    Email phishing attacks peaked at the onset of COVID-19, and while some email attack tactics have plateaued, the increase in BEC attack volume remains a concern. Take a look at the changing trends in brand impersonation attacks here: https://hubs.li/H0v8KvV0
  • Sep 09
    We’re teaming up with experts from Microsoft on Sept 15th to talk about the evolution of SOC responsibilities, and the key attributes to building a smarter SOC. Register now >> https://hubs.li/H0vh3hD0
  • Sep 08
    Cyber security is continuing to grow even in the face of a pandemic, with the need for cloud-related security leading the growth while enterprises adapt to hybrid or remote conditions. Read more in Forbeshttps://hubs.li/H0vgp6m0
  • Sep 07
    Security researchers warn companies to seek AMIs from trusted sources for their EC2 instances. Threatpost reports on a new details released about how threat actors can easily build malware-laced Community AMIs and make them available to unsuspecting AWS customers >> https://hubs.li/H0v8KvS0
  • Sep 04
    Marketers are only successful if they are able to market for the times, and that goes for marketing scams as well. Here’s how a group of cyber crooks marketed a voice phishing service targeting WFH employees for VPN credentials >> https://hubs.li/H0v8SSd0
  • Sep 03
    Amid the vulnerability of COVID-19 scammers have found a new target - U.S. citizens eligible for stimulus packages and unemployment benefits. This blog explains how scammers are selling and sharing details on anonymous forums to siphon the money intended for people who’ve suffered great financial loss due to the pandemic: https://hubs.li/H0v85dV0 #COVID_19 #CyberThreat #MoneyScam
  • Sep 02
    Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process' according to Forrester's independent evaluation of the top midsize MSSPs. https://hubs.li/H0tGLhp0
  • Aug 31
    There are many powerful defense tools, but using the right one at the right time is key. Join Halim Santoso, Abbas Kudrati, Richard Telleria and Anand Trivedi on September 2nd to learn about the tools you need to be prepared for increasing cyber threats >> https://lnkd.in/d-gPc-f
  • Aug 28
    We are honored to have been named a leader in the new Forrester Wave™ report on MSSPs. Learn their 26 measuring criteria, and what our Head of Cyber Threat Intelligence, Orel Pery, had to say about our 5/5 score in 'Threat Intelligence' https://hubs.li/H0tGMfV0
  • Aug 26
    Scammers have reached a new low, targeting SBAs and individuals suffering from financial straits due to COVID-19. Nethaniel Ribco explains how they are trying to steal the identity of U.S. citizens eligible for unemployment relief: https://hubs.li/H0tZlvz0 #UnemploymentRelief #COVID19 #CyberCriminals #IdentityTheft
  • Aug 25
    Join our webinar on September 2nd as we get together with experts from Microsoft and UST Global to talk about using automation and data analytics to combat the growing risks around us. Register now >> https://lnkd.in/d-gPc-f #securitywebinar #cybersecurityawareness
  • Aug 21
    At CyberProof, we’re thrilled to have been recognized by Forrester as a Leader in managed security services. Take a look at our key takeaways from their latest MSSP Wave™ Report, and how we believe we’ve differentiated ourselves from the competition here: https://hubs.li/H0txGsw0 #managedsecurityservices #MSSP #CyberSecurity
  • Aug 20
    Yuval Wollman, President of CyberProof, comments on our top marks in ‘Delivery Model Strategy' according to Forrester's independent evaluation of the top midsize MSSPs. https://hubs.li/H0tGKHk0
  • Aug 17
    Perimeter defense testing often includes its own form of Pen testing. Social engineering and leveraging weaknesses in the security system are the most common practices for pen-testing. Find out more in our blog. hubs.li/H0t4dkb0 #CyberSecurity #PenTesting #SocialEngineering #PerimeterDefense
  • Aug 16
    Billions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #BootloaderBillions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #Bootloader
  • Aug 15
    As security threats become increasingly sophisticated and highly targeted, organizations must expand detection coverage to rapidly contain and eradicate validated threats. Join our upcoming webinar to learn how to use attack simulations to continuously validate and remediate risks as they emerge. hubs.li/H0t4bdg0 #SecurityWebinar #SOCefficiency #AttackSimulations #CyberAttacks
  • Aug 14
    A cloud-native infrastructure provides more flexibility, scalability and security. Here’s how our membership with the Microsoft Intelligent Security Association is helping CyberProof and Microsoft customers update their security operations for a smarter SOC: hubs.li/H0tqTV_0 #CyberSecurity #Microsoft #Azure #SOC
  • Aug 13
    The word is out - we’ve been named a leader of midsize MSSPs! In this Forrester Wave™ independent report they dive into the 26 criteria of the most significant MSSP providers - we are thrilled to be included as a leader. Read the report now: hubs.li/H0txycd0
  • Aug 12
    Yesterday our CEO, Tony Velleca, and VP of Security Strategy, Bruce Roton, hosted a live security webinar on how companies can measure and improve their cyber defense using the MITRE ATT&CK Framework. Today, we have the recording for you on-demand here: hubs.li/H0sNbv60 #CyberSecurity #SecurityStrategies #MITRE
  • Aug 11
    Billions of Windows and Linux users are at risk of persistent compromise due to a bug discovered in the widely used bootloader that can be exploited to install malware. Learn more here: hubs.li/H0tfLCC0 #CyberSecurityNews #Malware #Bootloader
  • Aug 04
    Struggling to understand how you can continuously refine your cyber defense to keep up with emerging threats? On Aug. 18, CyberProof’s Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how organizations can use attack simulations to improve SOC efficiency. Save your spot in this upcoming webinar here: hubs.li/H0t4cCX0 #CyberDefense #SOCefficiency #AttackSimulations
  • Aug 03
    Join our live webinar on August 10th to discover how you can measure and improve your cyber defense using the MITRE ATT&CK Framework - register now! hubs.li/H0sNbxc0 #CyberSecurity #CyberDefense #mitreattack
  • Aug 02
    Establishing a secure perimeter is your first line of defense. This is especially true for areas like the server room where sensitive data - a high-value resource - is stored. In this blog our Senior SOC Analyst Fabio Lior Rahamim shares best practices for establishing a perimeter defense. hubs.li/H0t49Zq0 #PerimeterDefense #Defense #CyberSecurity #SecOps
  • Aug 01
    On Aug. 18th our Principal Security Architect, Robert "Teall" Rist CISSP, CISM, TOGAF 9, CHPA will be teaming up with XM Cyber's Director of Field Engineering, Konstantinos “Gus” Evangelakos, to discuss how you can improve SOC efficiency using attack simulations. Register here to join the conversation >> https://hubs.li/H0t4dcK0 #SOC #SecurityWebinar #AttackSimulations #CyberSecurity
  • Jul 31
    Here are some of the ways Microsoft and CyberProof customers will benefit from our latest partnership: ✔️Seamlessly collate and analyze data ✔️Enriched alerts ✔️Reduced mean time to detect and mean time to respond ✔️Scale security operations capabilities while lowering costs Ben Chant, CISMP, AMBCS shares more about our latest partnership here: https://hubs.li/H0sJ1h80 #CyberSecurity #ManagedSecurity #MSSP #Azure #Microsoft
  • Jul 14
    Evil Corp - a notorious cyber criminal gang associated with the banking credentials-stealing Zeus trojan and Bugat (aka Dridex) malware - is using tried-and-true attack tactics to launch new ransomware, WastedLocker. SC Media reports on the malicious framework being used to deliver the malware. https://hubs.ly/H0r-h_10 #Ransomware #EvilCorp #Malware #CyberCrime
  • Jun 24
    As cyber threats escalate amid budgetary constraints, CISOs are facing a myriad of challenges. On June 24th cyber security experts Terence Gomes, Anand Trivedi, Iftekhar Hussain, and Aman Malhotra will gather to discuss SIEM/SOC challenges as businesses scale down due to COVID-19, followed by a Q&A session. Register today to join the conversation >> https://lnkd.in/dmTU7fx #CyberThreats #CISOs #LiveWebinar #SIEM #SOC
  • Jun 04
    Now more than ever is the time for enterprises to change and adapt. Check out this interview with CyberProof CEO Tony Velleca. Learn about his journey through #SaaS and thoughts on various security threats that arise when a team starts working from home. https://hubs.ly/H0r0_L_0 #CyberSecurity #WFHsafety via SalesTech Star
  • May 20
    Where does a virtual cyber analyst meet human expertise? At CyberProof. We're constantly striving to make the world a better, safer place, in the cloud and on the ground. See how: https://hubs.ly/H0q5-Ft0 #CyberAnalysis #ThreatDetection #HUMINT #ManagedSecurityServices
  • May 04
    Threat actors are infiltrating an already panicked environment with fake coronavirus news. Being able to identify typical pseudo-news characteristics empowers you to weed out fake news stories – and help break the chain of mistrust. https://hubs.ly/H0qlWzL0 #ThreatActors #FakeNews #Infodemic #COVID19
  • Apr 01
    As you adjust to a new remote reality, our cyber threat intelligence team is at work investigating and exposing the latest happenings in the cyber crime communities. This blog identifies the threats and offers critical advice for keeping your cyber health resilient. https://hubs.ly/H0nM_nj0
  • Mar 31
    There’s no question that threat intelligence is a crucial piece of cyber security. But how do you know where, when, what and with whom to start? The answer is here - the ultimate guide to managed threat intelligence >> https://hubs.ly/H0nwvq50
  • Mar 27
    Cyber criminals and state-sponsored threat actors around the globe, are taking advantage of the COVID-19 outbreak to accelerate their activities and spread their own infections. Here’s how you can stay protected as new threats spread across the cyber landscape >> https://hubs.ly/H0nNfYG0
  • Mar 21
    Analysts predict that cyber crime will cost companies $6 trillion by 2021, which is double the $3 trillion it cost in 2015. So, how can organizations close the gap between cyber threats and cyber security? By implementing managed threat intelligence into their security strategy. Read on for a look at everything you need to know about how to ensure ultimate cyber resilience for your company. https://hubs.ly/H0nwb9h0 hashtagThreatPredictions hashtagCyberCrime hashtagSecurityStrategy
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, cyber insider threats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a security program for cyber insider threat identification and remediation. https://hubs.ly/H0nc6lX0 CyberInsiderThreats ProactiveDefence RiskManagement InsiderThreatProgram
  • Mar 09
    New trends have hit the cyber landscape in recent months - including a shift in data regulation, increased applications for AI, ML, deep learning and more. Here’s how we expect it to impact the cyber security industry - both in offensive and defensive security solutions. https://hubs.ly/H0n1MQb0 cyberscape AI hashtagML deeplearning cybersecuritytrends
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 20
    Starting tomorrow and throughout the next two days, we'll be in Bangalore CISO Platform Summit - one of India’s largest #securityevents where #CISOs will gather to share knowledge and empower themselves to make better security buying decisions. Visit us there at booth CP1230: https://hubs.ly/H0m_jJ20
  • Feb 19
    The #cybersecurity arena is facing a new era of threats, trends, and solutions. We conducted a survey across the company here at CyberProof exploring the question of what we can expect to see and uncovered some interesting predictions. Check them out on our latest blog >> https://hubs.ly/H0n1X940 #cybersecuritytrends #threatpredictions
  • Feb 17
    #ArtificialIntelligence can help #SOCs improve efficiency and reduce response times, but how can #AI and #Automation be put into practice on the ground - and in the cloud? This #securityebook provides a detailed guide for SOCs ready to take their #securityoperations into the future. https://hubs.ly/H0mSMzG0
  • Feb 16
    On Feb 21-22 we’ll be joining CISOs from around the world in Bangalore at the CISO Platform Summit, India’s largest #ITsecurity conference of the year. Visit us at booth CP1230 to learn how we’re using #AI and #automation to build a smarter #SOC >> https://hubs.ly/H0m_yWx0
  • Feb 13
    We’re excited to be Diamond Partners in this year’s CISO Platform Summit, India’s largest #ITsecurity conference - focusing on peer learning, security buying decisions and how we, as #threatintelligence leaders, can make a difference to the world of security. https://hubs.ly/H0m_qRQ0
  • Feb 12
    Here's what The Update Box is bringing to #RSAC2020 ✔️ Real-time vendor and press announcements ✔️ The latest info on upcoming speeches ✔️ A chance to win big at the event
    Enter the #RSAC Giveaway Basket raffle here: https://hubs.ly/H0mHYGf0
  • Feb 10
    Join part 2 of our upcoming #securitywebinar series on Feb 20th, to learn about the fundamentals of building an #intruderhunting program as part of your integrated #cybersecurity and risk management architecture. Sign up today >> https://hubs.ly/H0mNmJc0
  • Feb 05
    Our team had a great time at hashtaghc0n2020 sharing, learning, and networking with cyber tech professionals and ethical hackers at the biggest hacking community event in Spain this past weekend. hashtaghackerconference hashtagethicalhackers hashtaghc0n2020
  • Feb 04
    #Malware has been discovered in this device's very own setup app with little to no hope of removing it - and if that's not bad enough - there are TWO of them. SC Media has the details >> https://hubs.ly/H0mHYDY0 #BuyersBeware
  • Feb 03
    Curious what to expect at #RSAC2020? Stay up to date on the latest at this year's RSA Conference with The Update Box, sponsored by yours truly! https://hubs.ly/H0mJ3pD0
  • Feb 02
    Our team had a great time at Hackplayers #hc0n2020 sharing, learning, and networking with cyber tech professionals and #ethicalhackers at the biggest hacking community event in Spain this past weekend.
  • Jan 29
    We're proud to announce that Orel Pery, our CTI Team Leader will be presenting at one of the biggest #cybersecurity knowledge-exchange events of the year - #hc0n2020. Check out her upcoming participation at Hackplayers #hackingconferencehttps://hubs.ly/H0mMXLC0
  • Jan 27
    As we enter the next decade with #digitalization full steam ahead, where are intelligence expert focusing their efforts to stop #cybercriminals in their tracks? Help Net Security reports on #2020cybertrends and where attackers are expected to be heading: https://hubs.ly/H0mJ0D00
  • Jan 15
    The tables have turned on ring camera doorbells. SC Media shares the details on how hackers are gaining control of them and why the need for IoT security should be taken very seriously as we venture further into digitalisation. https://hubs.ly/H0mpr5M0 digitalisation IoT IoTsecurity hackers
  • Jan 10
    What will 2020 bring to the world of cyber security as IoT continues to evolve? Privacy protection is on the top of the list as the public domain as the demand for manufacturers to produce low-cost, integrated devices grows. https://hubs.ly/H0mpr5Y0   cybersecurity privacyprotection publicdomain
  • Jan 08
    Congrats to Yair Bar Touv, Joo Khuan Quek CISSP, CISM 郭裕宽 and team on the completion of the new branding in our Singapore Center of Excellence. The SOC team supports our regional and global customers for hashtagmdr and hashtagmssp services. hashtagcybersecurity hashtagsoc hashtagcyberproof
  • Dec 25
    Happy Holidays from everyone CyberProof. May your holidays will be filled with joy, laughter, and security through the New Year ahead! #HappyHolidays #SeasonsGreetings #HappyNewYear
  • Dec 23
    As we look ahead at the future of AI and cyber security, we must find a way to use AI to reduce and aid the work of the overloaded intelligence analysts - here's how cyber professionals can make that happen. hubs.ly/H0m22Q60 #AI #cybersecurity #ML #SOC #SOCefficiency #SecurityTeams
  • Jan 01
    The #CIATriad reflects a fundamental truth: it is essential for organizations to protect sensitive data from unauthorized access and that starts with #PerimeterDefense. Here's what you need to know. hubs.ly/H0t49ZT0
Twitter Twitter Follow Us
  • Oct 09
    The escalation of constant wild rumors in the news has been titled an #infodemic by the @WHO. Read more in the foll… t.co/x3IDViGFoc
  • Oct 08
    RT @cyberproofinc: Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC respo…
  • Oct 07
    Threat actors are taking criminal behaviour to the larger #hacking community, sharing #cyberattack methods on the… t.co/vMKdwLQkFK
  • Oct 06
    RT @cyberproofinc: Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC respo…
  • Oct 06
    Our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolution of #SOC… t.co/9tkvSFV0yw
  • Oct 01
    According to a recent survey in the #cybersecurity industry, about 67% of #securitybudgets stayed the same, or slim… t.co/cj4mVCBIuG
  • Sep 29
    A Bluetooth bug opens devices to a vulnerability that could allow #hackers to intercept and manipulate data from hu… t.co/Z8GVQuCJUp
  • Sep 25
    Adobe has released #cybersecurity updates addressing multiple #vulnerabilities for Adobe InDesign, Framemaker and E… t.co/wp8THMH5u3
  • Sep 24
    How do you reduce security risk in turbulent times, while remaining within budget? Check out 5 tips for #CISOs from… t.co/47EgERC7W2
  • Sep 21
    #CyberAttacks threaten the digital economy. Staying in control both with the correct tools and leadership is key. L… t.co/pT42EZXfIz
  • Sep 17
    As the U.S government looks to help citizens in financial distress due to the pandemic, a new #cyberthreat has surf… t.co/IlyPjRx6VG
  • Sep 16
    Did you miss @CyberProofInc and Microsoft's webinar on building a smarter SOC? You can watch it on demand… t.co/J3GckoCTPp
  • Sep 16
    Yesterday our #CyberSecurity experts sat down with @Microsoft EMEA’s Chief Security Advisor to discuss the evolutio… t.co/VxyauNE9yw
  • Sep 16
    RT @cyberproofinc: MITRE, creator of the ATT&CK Framework, has a new #CyberDefense resource called “Shield”. @SecurityWeek explains how #MI…
  • Sep 16
    MITRE, creator of the ATT&CK Framework, has a new #CyberDefense resource called “Shield”. @SecurityWeek explains ho… t.co/FapOJt7Hld
  • Sep 15
    How do #CISOs maintain a strong level of security in an era of growing threats and shrinking budgets? Read this blo… t.co/TxYQJtsGbX
  • Sep 14
    Email #phishing attacks peaked at the onset of #COVID_19, and while some threat tactics have plateaued, the increas… t.co/oy8NEewWxT
  • Sep 09
    A group of #cybercrooks are marketing a voice #phishing service targeting #WFH employees for VPN credentials.… t.co/8TiSx9KWiC
  • Sep 08
    Amid the vulnerability of #COVID_19 scammers have found a new target - U.S. citizens eligible for stimulus packages… t.co/QfXttIIWyI
  • Sep 08
    With the changing landscape brought on by #COVID_19, SOC expectations have been amplified. On Sept. 15th we’ll be t… t.co/02PiDFwW5r
  • Sep 07
    Estamos orgullosos de compartir el reconocimiento de @cyberproofinc, una compañía de #USTGlobal, como líder en MSSP… t.co/aJOTaA5835
  • Sep 04
    Cyber security is continuing to grow even in the face of a pandemic, with the need for cloud-related security leadi… t.co/F6N7TPpcyb
  • Sep 03
    RT @cyberproofinc: In yesterday’s live webinar we got together with #cybersecurity experts to discuss how to remain prepared against increa…
  • Sep 03
    In yesterday’s live webinar we got together with #cybersecurity experts to discuss how to remain prepared against i… t.co/xFzHJMfmkF
  • Sep 02
    RT @cyberproofinc: Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process' accor…
  • Sep 02
    Our Head of Security Services, Jaimon Thomas, comments on CyberProof's top marks for ‘Incident Management Process'… t.co/jYEqLlgr7D
  • Sep 02
    RT @cyberproofinc: We’re teaming up with with #CyberSecurity experts from @Microsoft on Sept.15th to talk about the evolution of #SOC respo…
  • Sep 01
    ATM manufacturers take action to fix software vulnerabilities after an uptick in deposit forgery attacks.… t.co/679c7fhl59
  • Sep 01
    Cyber incidents could cost Australia as much as $30 billion AUD this year. Learn the best tools to combat… t.co/PLB3NKqmRJ
  • Sep 01
    RT @cyberproofinc: On September 2nd we’re joining security leaders from @USTGlobal and @Microsoft Australia to discuss the best tools and t…
  • Aug 28
    RT @cyberproofinc: Check out this @Forrester Wave™ report as they share their findings on the top midsize #MSSPs to help security professio…
  • Aug 28
    Check out this @Forrester Wave™ report as they share their findings on the top midsize #MSSPs to help security prof… t.co/swhyw9cqzb
  • Aug 26
    RT @cyberproofinc: We are honored to have been named a leader in the new @forrester Wave™ report on #MSSPs. Learn their 26 measuring criter…
  • Aug 26
    RT @cyberproofinc: Take a look at how the #MITRE ATT&CK Framework helps organizations better protect themselves from #CyberAttacks by lever…
  • Aug 26
    Take a look at how the #MITRE ATT&CK Framework helps organizations better protect themselves from #CyberAttacks by… t.co/vTUApYYh4K
  • Aug 25
    COVID-19 has changed the landscape in all realms. Hear from #cybersecurity experts at @cyberproofinc, @USTGlobal an… t.co/wKBG5jf0ZX
  • Aug 24
    Scammers have reached a new low, targeting #SBAs and individuals suffering from financial straits due to #COVID19.… t.co/SGbepyS4Gm
  • Aug 18
    #PerimeterDefense testing often includes its own form of #PenTesting. #SocialEngineering and leveraging weaknesses… t.co/i7XwpTsslI
  • Aug 17
    Congratulations @cyberproofinc for making the shortlist! t.co/ihsBVLOCva
  • Aug 17
    RT @cyberproofinc: Join tomorrow’s #securitywebinar to discover how to improve #SOCefficiency using #AttackSimulations continuously validat…
  • Aug 17
    Join tomorrow’s #securitywebinar to discover how to improve #SOCefficiency using #AttackSimulations continuously va… t.co/3VUkWXLp7z
  • Aug 17
    Our CEO, @TonyVelleca, comments on CyberProof's top marks for ‘Business Value' according to @Forrester's independen… t.co/XZnZ1plegI
  • Aug 15
    RT @cyberproofinc: The highly regarded @Forrester Wave™ report is out. This blog provides some of our key takeaways >> t.co/Ch0rO6C…
  • Aug 14
    @britanalytics2 @cyberproofinc @cyberdefensemag @miliefsky Congratulations!
  • Aug 13
    @cyberproofinc Ranked As A Midsize Managed Security Services Provider (MSSP) Leader By Independent Research Firm… t.co/fPWK2i1S9K
  • Aug 13
    A cloud-native infrastructure provides flexibility, scalability and better #cybersecurity. Here's how our Microsoft… t.co/09In2XMAIW
  • Aug 13
    @cyberproofinc @forrester CyberProof has done it again - yet again we lead the pack in the SOC / MSSP space
  • Aug 12
    Author of #FastPOS pleads guilty to creating the #malware strain designed to infect computers processing payment ca… t.co/V7hFLwfbex
  • Aug 10
    How does the MITRE ATT&CK help create a smarter #SOC? ✔️ #ThreatIntelligence mapping ✔️ Data source gap identificat… t.co/bBQ9HpYl7Z
  • Aug 10
    Billions of #Windows and #Linux users are at risk of persistent compromise due to a bug discovered in the widely us… t.co/1BP1RaJGD2
  • Aug 03
    RT @cyberproofinc: The #MITRE ATT&CK Framework is a powerful #CyberSecurity tool. In this upcoming #SecurityWebinar we shed light on how co…
  • Aug 03
    The #MITRE ATT&CK Framework is a powerful #CyberSecurity tool. In this upcoming #SecurityWebinar we shed light on h… t.co/LhuzNGBkMt
  • Aug 01
    @cyberproofinc 👇 t.co/7Jp251KX1Z
  • Jul 31
    A secure #Perimeter is your first line of #Defense. This is especially true for areas like the server room where se… t.co/OZuSvdvm4Y
  • Jul 31
    #DataBreach monitoring site, Data Viper, has fallen victim to its own worst nightmare. @briankrebs reports on the >… t.co/cUmvEVSf6Z
  • Jul 30
    Our latest @Microsoft partnership provides customers with the ability to ✔️ Seamlessly collate and analyze data ✔️… t.co/9S8hplVUm5
  • Jul 30
    On Aug. 18th we’ll be teaming up with @XMCyber_ for a #cybersecurity #webinar to discuss how you can improve #SOC e… t.co/B3hpTZoAO9
  • Jul 29
    In this blog we provide a recap on the latest @SANSInstitute #MITRE report, exploring the ATT&CK #SecurityFramework… t.co/xKXWgPj8lO
  • Jul 28
    Plugged, the #CyberCrime marketplace discovered by our #ThreatIntel team, is working hard to become one of the most… t.co/d5k0GzmMpc
  • Jul 28
    Another major #DataBreach has been reported, this time affecting millions of LIveAuctioneer customers. @gcluley has… t.co/VorccWvwc2
  • Jul 27
    Join our live #SecurityWebinar on August 10th to discover how you can measure and improve your #CyberDefense using… t.co/pHcATsoMbK
  • Jul 27
    Organizations often invest heavily in multi-layered #SecurityTools - yet struggle to understand their effectiveness… t.co/gbG3fJiSK9
  • Jul 15
    This eBook provides security & risk leaders with guidance on how to spend their money, time and effort on the vulne… t.co/DjtLKUYTLc
  • Jul 15
    #EvilCorp - a notorious #RansomwareGang - is using tried-and-true #CyberAttack tactics to launch new #ransomware,… t.co/EiOzr48JXN
  • Jul 14
    We are delighted to announce our official membership to the Microsoft Intelligent Security Association (MISA). Read… t.co/7FkJFL0XGA
  • Jul 14
    #IoT growth will expand the attack surface on #5G networks exponentially, with a highly complex ecosystem that has… t.co/bs0nUmqZoA
  • Jul 10
    Find out how CyberProof and @SkyboxSecurity are helping businesses reduce #CyberRisks and optimize #SecuritySpend w… t.co/uScrysROEn
  • Jul 10
    Encryption has improved website security and user privacy, however it has also proven to offer #CyberCriminals a ne… t.co/QOf3ajBX0h
  • Jul 08
    Organizations are looking to protect themselves from increasingly sophisticated #CyberAttacks. This blog provides i… t.co/gSJudVJcsJ
  • Jul 07
    Over 1.2 million Stalker Online player records are being offered for sale on the #darkweb. @gcluley reports on how… t.co/juJcTF57It
  • Jun 18
    As one of the fastest growing wireless cellular technologies to date, 5G is causing yet another major shift in the… t.co/vUEaIhHbRp
  • Jun 16
    Breaking: Our #ThreatIntelligence team discovered a new #CyberCrime marketplace, Plugged, using advanced techniques… t.co/gcGh8txTnT
  • Jun 16
    Join us next week to discover how #CISOs can contend with the new normal and the #CyberSecurity challenges that com… t.co/5dOikHQ1PZ
  • Jun 11
    In two recent reports @forrester notes the importance of leveraging #SOAR capabilities and #MSSPs to strengthen… t.co/XItFur7eV7
  • Jun 10
    #TorBrowser has the benefit of anonymity, but it opens organizations to increased #CyberRisks. Here’s how… t.co/mUri7mWoGv
  • Jun 09
    Wondering how #MDR works, day-to-day? Here are key insights on the subject - including how #AI and #ML assists secu… t.co/rUz0SxOBKN
  • Jun 05
    This week we saw a number of security issues affecting Exim MTA servers, as well as attacks exploiting SaltStack vu… t.co/y51jXgXw8h
  • Jun 05
    Why is #TorBrowser a risk for organizations? A quick rundown includes: ⚠️Bypassing network security insider ⚠️Insid… t.co/0SPJbyaRx7
  • Jun 02
    We are excited to share details of our upcoming Virtual Coding Tournament with @SecCodeWarrior. Join us on June 20… t.co/aRrilDw5Wj
  • May 26
    "I believe security should continuously adapt to solve the key challenges of the day. And now is a time of challeng… t.co/CsrSNVwEX9
  • Apr 01
    As you adjust to a new #RemoteWork reality our #CTI team investigates the latest happenings in #CyberCrime communities. This blog identifies #CyberThreats and offers critical advice for keeping  our #CyberHealth resilient. blog.cyberproof.com/blog/new-cyber-security-threat-hackers-take-advantage-of-coronavirus
  • Mar 26
    Organizations are vulnerable to malicious campaigns as #Coronavirus forces us many to quickly adapt to a #WFH environment. These guidelines will help minimize potential #CyberSecurityThreats to your organization. blog.cyberproof.com/blog/cyber-security-risk-assessment-threats-to-remote-workers
  • Mar 17
    Thank you @microfocus for the distinction of South Channel Partner of the Year 2020 at this year's Virtual Universe! #MicroFocus #VirtualUniverse twitter.com/MicroFocusNews/status/1239898083200303104
  • Mar 04
    Seriously, the commitment and devotion of our sponsors to tackle the #cybersecurity workforce and walk the walk of… t.co/vatuKVtOVh
  • Mar 04
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Mar 02
    RT @cyberproofinc: We’re honored to be recognized by the #CyberSecurityExcellenceAwards2020 as a winner in the #MDR category. >> t.…
  • Feb 25
    En el #CyberSecuritySummit2020, organizado por Esade y @cyberproofinc @USTGlobal_ES, pudimos asistir a interesantes… t.co/cihaK3SRH9
  • Feb 19
    RT @cyberproofinc: Check out our #CyberHub - your place for the latest #cybersecurity news & updates: t.co/iEYTwShTX8
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    RT @USTGlobal_ES: Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster IT+IP d…
  • Feb 18
    Comenzamos el evento #CyberSecuritySummit2020 en @ESADELawSchool Lo inauguran @xribas , co-director del Máster I… t.co/NdaT8koQns
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 16
    RT @cyberproofinc: On Feb 21-22 we’ll be joining #CISOs from around the world in Bangalore @CISOPlatform Summit, India’s largest #ITsecurit…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 14
    RT @cyberproofinc: Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to…
  • Feb 13
    RT @cyberproofinc: We’re excited to be Diamond Partners in this year’s @CISOPlatform Summit, India’s largest #ITsecurity conference - focus…
Facebook Facebook Follow Us
  • Oct 09
    During a period of uncertainty where global dangerous ploys of fake news spread, the
    World Health Organization (WHO)
    has named this an #infodemic. Our Senior SOC Analyst, Fabio Lior Rahamim highlights 8 tips to identify false information here:
  • Oct 07
    We teamed up with #CyberSecurity experts from
    Microsoft
    to discuss the evolution of #SOC responsibilities, and the key attributes to building a #smarterSOC. Watch it now >> https://hubs.ly/H0xv3l80
  • Oct 01
    While security needs have grown, budgets have not. CISOs have the challenge of maintaining a strong level of #cybersecurity in a time of pandemic. In this blog we review our top 5 tips for #CISOs to help them continue to combat risk within budget.
  • Sep 27
    Triggered by an uptick in deposit forgery attacks, ATM manufacturers take action to fix software vulnerabilities that allowed attackers to forge the amount of money being deposited - followed by illegal cash withdrawals. Read on to learn more: https://hubs.ly/H0v8KvQ0
  • Sep 23
    Pandemic has caused cyber threats to rise and budgets to fall. Learn how #CISOs can combat their #cyberthreats effectively amidst #cybersecurity budget constraints in this blog:
  • Sep 21
    As #CyberAttacks and threats become more sophisticated, the tools to combat them need to advance as well. In this blog, we talk about the potential devastation of #CyberAttacks and the importance of the right #CyberSecurity tools to build a #smarterSOC. https://hubs.ly/H0vmhrz0
  • Sep 17
    MITRE, creator of the ATT&CK Framework, has introduced a new #CyberDefense resource called“Shield”.
    SecurityWeek.Com
    explains how the #MITREShield - a continuously evolving tool - will help organizations strengthen their active defense solutions.
  • Sep 15
    According to a recent survey in the #cybersecurity industry, about 67% of #securitybudgets stayed the same, or slimmed down, in the last six months. With threats rising, enterprises need to be able to manage their risks while remaining within a budget. Learn the top 5 tips for #CISOs to make this happen, here: https://hubs.ly/H0w9sPx0
  • Sep 11
    It’s more critical than ever to extend #MDR capabilities into the cloud—but how can you ensure the inevitable complexities won’t overburden your #SOC team? Join these #CyberSecurity on Sept. 15th to learn how >> https://hubs.ly/H0vkPF60
  • Sep 09
    We’re teaming up with with #CyberSecurity experts from
    Microsoft
    on Sept. 15th to talk about the evolution of #SOC responsibilities, and the key attributes to building a #smarterSOC. Register now >> https://hubs.ly/H0vkNJr0
  • Sep 08
    A new #CyberThreat has come to light - scamming those receiving government funds during #COVID_19. This blog explains how scammers are selling and sharing details on anonymous forums to siphon the money intended for people who’ve suffered great financial loss due to the pandemic: https://hubs.ly/H0v8q9N0
  • Aug 31
    Join us on September 2nd, as we get together with #cybersecurity leaders from
    Microsoft
    and
    UST Global
    to talk about:
    ⚠️The new threat landscape from COVID-19
    ⚠️Top automation tools to stay prepared
    ⚠️The importance of #data analytics
    And more!
    Followed by a Q&A session. Register now >>> https://hubs.ly/H0tRnCF0
     
  • Aug 27
    The Forrester Wave™ report evaluates 26 criteria when determining the top midsized MSSPs, with CyberProof receiving the highest score possible in 17 out of 26 criteria. Read the report to learn what we think differentiates us from the rest: https://hubs.ly/H0tGL0t0  
  • Aug 26
    At CyberProof, we’re thrilled to have been recognized by Forrester as a Leader in #managedsecurityservices. Take a look at our key takeaways from their latest #MSSP Wave™ Report, and how we think we’ve differentiated ourselves from the competition here: https://hubs.ly/H0txFvK0
  • Aug 20
    With this year’s overwhelming number of quality entrants into the 2020 American Cyber Awards it is an honor to have made the shortlist for Best Security Company of the Year! Check out the full list of finalists here: https://hubs.ly/H0tSwVj0
  • Aug 19
    Our CEO, Tony Velleca, comments on CyberProof's top marks for ‘Business Value' according to Forrester's independent evaluation of the top midsize #MSSPs. https://hubs.ly/H0tGLg40
  • Aug 17
    Yuval Wollman, President of CyberProof, comments on our top marks in ‘Delivery Model Strategy' according to Forrester's independent evaluation of the top midsize #MSSPs. hubs.ly/H0tGLgs0
  • Aug 14
    As security threats become increasingly sophisticated and highly targeted, organizations must expand detection coverage to rapidly contain and eradicate validated #CyberThreats. Join our upcoming #SecurityWebinar to learn how to use #AttackSimulations to continuously validate and remediate risks as they emerge. hubs.ly/H0t4dgg0
  • Aug 13
    What does our membership with Microsoft Intelligent Security Association (MISA) offer security teams? By integrating the CyberProof Defense Center with Microsoft Azure, security teams can use their existing investments in security and cloud applications at scale while lowering costs. Read this Press Release to learn more: hubs.ly/H0svGk30
  • Aug 12
    The word is out - we’ve been named a leader of midsize MSSPs! Know the top 26 criteria Forrester uses to determine #MSSP leaders in this independent report, which we are thrilled to be included in: hubs.ly/H0txBN20
  • Aug 05
    #BadActors are getting more sophisticated, and younger than ever … Tampa Bay Times shares how a 17-year-old from Tampa accessed high-profile accounts with millions of followers using a #spearphishing attack technique: hubs.ly/H0tfLCS0
  • Aug 04
    Struggling to understand how you can continuously refine your #CyberDefense to keep up with emerging threats? On Aug. 18, CyberProof’s Principal Security Architect, R. Teall Rist will be teaming up with XM Cyber's Director of Field Engineering, Gus Evangelakos, to discuss how organizations can use #AttackSimulations to improve #SOCefficiency. Save your spot in this upcoming webinar here: hubs.ly/H0t4bgr0
  • Aug 03
    Join our live #SecurityWebinar on August 10th to discover how you can measure and improve your #CyberDefense using the #MITRE ATT&CK Framework - register now! hubs.ly/H0sM_1g0
  • Jul 31
    A closely interwoven #cybersecurity ecosystem is in high demand, encouraging the Microsoft Intelligent Security Association to grow - and we’re excited to be a part of it! Microsoft customers are now be able to take advantage of our cloud-native, next-generation #ManagedSecurity services through the Microsoft Azure Marketplace: hubs.ly/H0sJ1M80
  • Jun 29
    As organizations slowly return to the “old normal” security leaders are reviewing what #CyberSecurity measures have been put in place in the last few months – and evaluating #ProactiveSecurity measures to minimize #CyberThreats and risks. This blog will help you get started with a basic list of #SecurityTips: https://hubs.ly/H0rnXTd0
  • May 30
    Using #DF this airline discovered the details of how a highly sophisticated #hack compromised millions of customers' personal data. Forbes reports on what the airline’s CEO has to say about the #CyberAttack, as well as precautionary measures its customers should be taking. hubs.ly/H0q-csg0
  • Mar 30
    There’s no question that #ThreatIntelligence is a crucial piece of #CyberSecurity. But how do you know where, when, what and with whom to start? The answer is here - with the ultimate guide to #ManagedThreatIntelligence >> https://www.cyberproof.com/managed-threat-intelligence/
  • Mar 25
    In the past week, there has been a spike of #SpearPhishing attacks as well as new VPN threats around Coronavirus. Our #CyberHub is keeping a close on these, as well as providing updates on new capabilities of the infamous trojan #Trickbot #EternalDarkness and #Phishing campaigns as an attack vector on organizations: https://www.cyberproof.com/cyber-hub/
  • Mar 19
    Big thanks to Hen Porcilan for offering insights on streamlining responses against #cyberattacks in yesterday's #SecurityWebinar. In case you missed it or would like to review, you can check it out on-demand here: https://go.cyberproof.com/webinar-streamlining-your-response-to-cyber-attacks
  • Mar 11
    Whether it be due to negligence, malicious intent or infiltration, #CyberInsiderThreats are top of mind for many organizations. Sinu Peter, CyberProof’s Principal Security Architect, is here to help you get started on exploring what you need to develop a #CyberSecurity program for #InsiderThreat identification and remediation: https://hubs.ly/H0nc2h30
  • Mar 10
    Up to date with your security operations? Confident in dealing with #cybersecurity issues? Fear not, CyberProof’s own Senior Security Analyst, Hen Porcilan is hosting a webinar on March 18th, providing tips on how to streamline responses against #cyberattacks leveraging advanced SOC technology. Join us: https://hubs.ly/H0n515h0
  • Mar 05
    In the wake of increasingly sophisticated #CyberThreats, the pressure on enterprise security teams intensifies. Rather than trying to outpace the explosion of #CyberSecurity alerts by constantly hiring more analysts for your #SOCteam#SecurityAutomation services allow SOCs to scale in several key ways. Our CEO, Tony Velleca, explains how on our blog >> https://hubs.ly/H0nh_3p0
  • Feb 25
    #Hackers are known to keep their eye on the virtual door of video #conferencing - looking for flaws to sneak into confidential meetings. Threatpost reports on what Zoom is doing to continue #changingthewaypeoplework and create an online room for people to #meethappy and confidently: https://hubs.ly/H0mZrdv0
  • Feb 21
    We're heading to Bangalore to join CISOs from around the world for two days of peer learning and networking, with a focus on how to make the world a safer place by making better security buying decisions. Meet us at the CISO Platform Summit >> https://hubs.ly/H0m_sSH0
  • Feb 19
    With concerns rising over online #dataprofiling #IoTdevices #facialrecognition software and more… data and digital #privacylaws are at the center of core issues for governments to address. @ITSecGuruNews provides an overview of the #dataprivacy landscape and what's coming for 2020 >> https://hubs.ly/H0mZrdk0
  • Feb 18
    Ready to build an effective Intruder Hunting Program? Join us today for part 2 of our webinar series our VP and Global Head of Customer Success, Bruce A. Roton will explore the following: ☑️ How to identify what you are looking for ☑️ How to select and use the tools at your disposal ☑️ How to build an Intrusion Sensor Array ☑️ The fundamentals of data collection and analysis for use in intruder detection ☑️ Creating an integrated security and risk management architecture
    Sign up for part 2 of this expert security series today to join the conversation >> https://hubs.ly/H0n2zFQ0 Missed part 1? Get it on demand here >> https://hubs.ly/H0n2zl60 #intruderhunting #intruderdetection #securitywebinar #proactivecybersecurity #cybersecurity
  • Feb 17
    We already know not to believe everything we read online, but what about what we see? The lines of reality are being blurred more than ever as #cybercriminals continue to break the truth-barrier with #deepfake videos being created #IRT. https://hubs.ly/H0mZrcp0
  • Feb 14
    Here’s a glimpse at our last #securitymeetup - an evening of networking, peer sharing, and learning. Want to stay up to date on the next one? Check out our #CyberHub for the latest updates on events, meetups, webinars, and more. https://hubs.ly/H0m_jLs0
  • Feb 13
    If you already have a technical background in #cybersecurity and are looking to delve deeper into the processes of developing an effective #intruderhunting program, this #securitywebinar is for you! Join CyberProof's VP and Global Head of Customer Success, Bruce A. Roton on Feb 20th and gain expert insights into intruder detection, eviction, and remediation >> https://hubs.ly/H0mNCvB0
  • Feb 11
    #Cybersecurity today needs to go beyond playing the defensive to stay ahead of the game. See how CyberProof is bringing #securityservices to the next level with a combination of #automation and #HUMINThttps://hubs.ly/H0mNwwx0
  • Feb 06
    Download our #securityebook to learn about the issues facing today’s #SOC – and how #AI and automation can help organizations stay safe and resilient. https://hubs.ly/H0mSWk50
  • Feb 05
    When it comes to #cyberattacks, the question is not IF but rather WHEN? In part 1 of our intruder hunting #securitywebinar series, we discussed why proactive #intruderhunting is vital to your #cybersecurity strategy. In our upcoming webinar, we'll delve deeper into the processes of building an effective intruder detection program. https://hubs.ly/H0mNHyz0
  • Feb 03
    Huge shout out to our Threat Intelligence Team Leader, Orel Pery, who inspired hundreds of cyber tech leaders at Hackplayers #hc0n2020 with her presentation on getting inside a hackers mindset from the perspective of an analyst - and the connection between the two.
  • Jan 30
    At CyberProof #cybersecurity and #threatintelligence are much more than a day job, it's part of our DNA. Take a couple of minutes (2:17 to be exact) to meet the experts behind CyberProof and see how we transform #securityoperations >> https://hubs.ly/H0mNHFv0
  • Jan 24
    #usecasefactory in your #cybersecuritystrategy is vital for mitigating risks and minimizing damage to an organization. Part 2 of this blog series takes a closer look at the process of identification, validation, development, and operation of a use case: https://hubs.ly/H0mzl9h0 #riskassessment #proactivedefense
  • Jan 23
    We're excited to take part in making this year's #RSAC the best yet, with the launch of The Update Box. A platform that offers RSA attendees the opportunity to optimize their #RSAC2020 experience with real-time info on the best talks, vendor announcements, and press. Check it out here: https://hubs.ly/H0mHYFV0
  • Jan 15
    The tables have turned on ring camera doorbells. @SCMag shares the details on how #hackers are gaining control of them and why the need for #IoT #security should be taken very seriously as we venture further into #digitalisation. hubs.ly/H0mpsNP0
  • Jan 14
    In part 1 of this blog series, we discussed how building a #usecase package requires specific skills – now we're delving deeper into the development process for a #usecasefactory. Let's take a closer look >> hubs.ly/H0mzjYk0 << #cybersecurity #proactivecybersecurity
  • Jan 10
    What will 2020 bring to the world of #cybersecurity as #IoT continues to evolve? #Privacyprotection is on the top of the list as the #publicdomain as the demand for manufacturers to produce low-cost, integrated devices grows. hubs.ly/H0mpqVt0
  • Jan 06
    #ThreatHunting is an art form of sorts. It requires actively looking for signs of malicious activity within enterprise networks, but without prior knowledge of those signs - and for that, the key to success is the expertise of your #securityteam. hubs.ly/H0mg1Gj0
  • Jan 03
    Join part 1 of our upcoming #securitywebinar series on Jan 14th, to learn about the resources and functional components required for effective #IntruderHunting. Then, keep an eye out for Part 2 where we'll delve deeper into the issues and processes of #intruderdetection, from first response through intruder eviction and remediation.
  • Jan 01
    The attack surface has expanded in tandem with the spread of #COVID19. In this #LiveWebinar, CyberProof India’s Head of Cyber Security Business, will discuss the scope of how the pandemic has affected Indian enterprises - and how #CISOs can respond to new security challenges. hubs.ly/H0pW2MY0
Upcoming Events
Webinars
  • On Demand: Building A Smarter SOC In The New Normal

    The evolution of SOC responsibilities, and the key attributes to building a smarter SOC. Join >

  • On Demand: Using Automation and Data Analytics to Combat Increasing Cyber Threats

    How the cyber security landscape in Australia has been altered due to COVID-19 Join >

  • On Demand: Best Practices Using Attack Simulations to Improve SOC Efficiency

    Improve SOC efficiency using attack simulations Join >

  • On Demand: Measuring and Improving Cyber Defense Using The MITRE ATT&CK Framework

    Measuring and Improving Cyber Defense Using The MITRE ATT&CK Framework Join >

  • On Demand: Focusing on the Vulnerabilities That Matter Most

    Discover how a threat-centric approach to vulnerability management provides an accurate and continuous view of risk exposure to organizations. Join >

  • On Demand: The Essentials of a Smarter SOC in the New Normal

    Learn how intelligent SIEMs build smarter SOCs Join >

  • On Demand: InfoSec in India – Before, During, and After COVID-19

    Learn how CISOs can prioritize threat intelligence operations and provide security support and training. Join >

  • On Demand: Security & Privacy Trends in the COVID-19 Era

    In this webinar you'll learn ways to use security to support business, protect brands, and promote trust. Join >

  • On Demand: DevSecOps – How To Do More With Less

    In this webinar you'll gain insights on the value of DevSecOps initiatives. Join >

  • On Demand: Is AI Being Weaponized by Cyber Criminals?

    Are hackers really using AI to enhance their attacks? If so, what does this mean for the companies that have adopted this technology? Join >

  • On Demand: Streamlining Your Response to Cyber Attacks – An Analyst’s Perspective

    Learn how the CyberProof platform helps analysts streamline response time to cyber attacks Join >

  • On Demand: Introduction to Pro-Active Intruder Hunting – Part 2

    Learn how to build an effective and proactive Intruder Hunting Program. Join >

  • On Demand: Introduction to Pro-Active Intruder Hunting – Part 1

    Learn how to build an effective and proactive Intruder Hunting Program. Join >

  • On Demand: New Approaches To DFIR That Can Radically Reduce Your Time To Respond to Attacks

    Learn about new approaches to DFIR that can radically reduce your attack response time. Join >

  • On Demand: How to Reverse Cyber Security’s Staffing Shortage

    Learn how you can reverse cyber security’s staffing shortage via best hiring and security automation. Join >

  • On Demand: How AI Can Increase the Efficiency of Your SOC

    Learn how AI and automation can increase the security posture of the enterprise. Join >

  • On Demand: How Threat Intelligence-Driven Security Operations Leads to Reduces Cyber Incidents

    Learn how to spot and block malicious actors before they become attackers with threat intelligence-driven security operations. Join >

  • On Demand: SANS SOC Survey: Best Practices for Security Operations Centers

    The 2019 SANS Security Operations Center (SOC) Survey is focused on providing objective data to security leaders who are looking to establish a SOC or optimize an existing one. This webcast will capture common and best practices, provide defendable metrics that can be used to justify SOC resources to management, and highlight the key areas that SOC managers should prioritize to increase the effectiveness and efficiency of security operations. Join >

  • On Demand: Security Thought Leadership Webinar – July 2019

    Security Thought Leadership: New insights uncover ways to reduce risk Join >

Latest Resources Our Latest Resources
Report The Forrester Wave™: Midsize MSSPs, Q3 2020

Independent Evaluation of the Top Midsize MSSPs

Read the report

Stay up to date

VISIT OUR BLOG