Back

CyberProof Blog

How AI is shifting the paradigm to give more power to threat actors

3 minute read

Mitigating cloud transformation risk with cloud-native solutions

Cybersecurity
5 minute read

Our newsletter is only one click away!

Mitigating risk after large-scale security team layoffs

Cybersecurity
4 minute read

Advanced Persistent Threats (APTs) linked to Russian Proxies

Cybersecurity
5 minute read
BlackLotus

How the first UEFI bootkit, BlackLotus, bypassed Windows security

Cybersecurity
2 minute read

SOC Masterclass recap: AI, geopolitics, the recession and more

Cybersecurity
3 minute read

A Day in the Life of a SOC Manager: Interview with Aneesh Jayakumar

Cybersecurity
3 minute read

Cutting Costs with Microsoft Azure Data Explorer (ADX)

Cybersecurity
4 minute read

Threat hunter’s arsenal: The mindset and tools for proactive hunting

Cybersecurity
7 minute read

Women & Cyber - Debunking Misconceptions for International Women's Day

Cybersecurity
5 minute read

Interview: What can we do to boost gender diversity in cybersecurity?

Cybersecurity
2 minute read

5 Tips for Choosing a Managed EDR Solution

Cybersecurity
3 minute read

The Case for Managed Endpoint Detection & Response (EDR)

Cybersecurity
3 minute read

Targeted Threat Intelligence: Turning Challenges to Opportunities

Cybersecurity
4 minute read

How ransomware actors use EDR bypassing to run cybercrime campaigns

Cybercriminal
3 minute read

8 New Year’s resolutions for cybersecurity professionals

Cybersecurity
4 minute read

Cybersecurity: new threats, new models - interview with Yuval Wollman

Cybersecurity
2 minute read

The real cost of stolen data

Cybersecurity
4 minute read

5 takeaways from Forrester’s latest privacy report

Forrester Report
2 minute read

5 Cyber Health Strategies We Can All Be Thankful For

2 minute read

Are attackers using AiTM to bypass your MFA and obtain account access?

Cyberattack
3 minute read

Why data protection is essential for your business

Cybersecurity
2 minute read

CyberProof SOC Masterclass: Managing cloud-native security operations

Security Operations Center
5 minute read

IOC Data Suggests Russia Bypassed Geolocation Bans – CTI Report

Threat Intelligence
2 minute read

Double-bounced attacks with email spoofing – 2022 trends

Cyberattack
3 minute read

A look at some of the reasons behind top malware trends in 2022

Cybersecurity
6 minute read

Protecting Enterprises as They Migrate to the Cloud – and Beyond

2 minute read

Considering a Career in Cyber Security? Here's What You Need to Know

Working in Cyber
3 minute read

Creating a Smarter SOC with the MITRE ATT&CK Framework

Use Case Factory
3 minute read

CyberNews: Quick Response as Important as Threat Prevention

Security Monitoring
5 minute read

What’s Hot at Infosecurity Europe

Events
3 minute read

Why It’s Great to Work for an MDR Provider

Working in Cyber
2 minute read

Cloud Security, Ransomware Simulation & More in Our SOC Masterclass

Events
5 minute read

Why Use an MDR Provider? Forrester’s Key Findings about the MDR Market

MDR
4 minute read

Reducing Alert False Positives with Risk-Based Use Case Mapping

Security Monitoring
3 minute read

Reducing the Cybersecurity Risks of Mobile Devices

Cyber Best Practices
5 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022

Cyber Warfare
2 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022

Cyber Warfare
4 minute read

Leveraging Threat Hunting Tools to Improve Threat Detection & Response

Threat Hunting
6 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022

Cyber Warfare
2 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022

Cyber Warfare
2 minute read

6 Ways Intelligence Boosts Cyber Detection & Response

Threat Intelligence
4 minute read

How Cyber Attackers Use the Custom-Built Exfiltration Tool BlackMatter

Ransomware
5 minute read

Protect Your Organization from Ransomware in 2022

Threat Intelligence
2 minute read

How FOMO – “Fear of Missing Out” – Hurts Effective Security Monitoring

SOC
3 minute read

8 Steps to Improving Your SOC’s Incident Detection & Response

SOC
5 minute read

Which Countries are Most Dangerous? Cyber Attack Origin – by Country

Threat Intelligence
1 minute read

How Cyber Attackers Have Become Marketing Experts

4 minute read
10 Ways To Keep Your SOC Team Motivated and Avoid Burnout

10 Ways To Keep Your SOC Team Motivated and Avoid Burnout

SOC
6 minute read

Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day

Cyber Alerts
1 minute read
Content not found

Our newsletter is only one click away!

Topics