Back

CyberProof Blog

Double-bounced attacks with email spoofing – 2022 trends

Cyber Attack
3 minute read

A look at some of the reasons behind top malware trends in 2022

Cyber Security
6 minute read

Our newsletter is only one click away!

Protecting Enterprises as They Migrate to the Cloud – and Beyond

2 minute read

Cutting Azure Sentinel Costs with Microsoft Azure Data Explorer (ADX)

Sentinel
4 minute read

Considering a Career in Cyber Security? Here's What You Need to Know

Working in Cyber
3 minute read

Creating a Smarter SOC with the MITRE ATT&CK Framework

Use Case Factory
3 minute read

CyberNews: Responding Quickly to Attacks Is as Important as Threat Prevention

Security Monitoring
5 minute read

What’s Hot at Infosecurity Europe

Events
3 minute read

Why It’s Great to Work for an MDR Provider

Working in Cyber
2 minute read

Cloud Security, Ransomware Simulation & More in Our SOC Masterclass

Events
5 minute read

Why Use an MDR Provider? Forrester’s Key Findings about the MDR Market

MDR
4 minute read

Reducing Alert False Positives with Risk-Based Use Case Mapping

Security Monitoring
3 minute read

Reducing the Cybersecurity Risks of Mobile Devices

Cyber Best Practices
5 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022

Cyber Warfare
2 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022

Cyber Warfare
4 minute read

Leveraging Threat Hunting Tools to Improve Threat Detection & Response

Threat Hunting
6 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022

Cyber Warfare
2 minute read

Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022

Cyber Warfare
2 minute read

Women & Cyber - Debunking Misconceptions for International Women's Day

Working in Cyber
5 minute read

6 Ways Integrating Cyber Threat Intelligence Improves Detection & Response

Threat Intelligence
4 minute read

How Cyber Attackers Use the Custom-Built Exfiltration Tool BlackMatter

Ransomware
5 minute read

How to Protect Your Organization from Ransomware in 2022: CyberProof's Report

Threat Intelligence
2 minute read

How FOMO – “Fear of Missing Out” – Hurts Effective Security Monitoring

SOC
3 minute read

8 Steps to Improving Your SOC’s Incident Detection & Response

SOC
5 minute read

Which Countries are Most Dangerous? Cyber Attack Origin – by Country

Threat Intelligence
1 minute read

How Cyber Attackers Have Become Marketing Experts

4 minute read
10 Ways To Keep Your SOC Team Motivated and Avoid Burnout

10 Ways To Keep Your SOC Team Motivated and Avoid Burnout

6 minute read

Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day

Cyber Alerts
1 minute read

Holiday Season Cyber Threats

4 minute read

CyberProof’s SOC Masterclass - A 360° Look into SOC Operations

6 minute read

Does Your SOC Measure Up? A “Sneak Peek” into the SANS SOC Survey

4 minute read

Diwali Shopping Season - Must-Know Tips to Protect Your Data & Company

4 minute read

Microsoft Exchange’s Basic Authentication – Know Your Weaknesses

4 minute read

Migrating to the Cloud? Put Cyber Security First!

Threat Intelligence
8 minute read

Why Your Cyber Security Strategy Must Include a Use Case Factory, P2

Use Case Factory
2 minute read

Why a Use Case Factory is Essential to Your Cyber Security Strategy

Use Case Factory
3 minute read

How to Develop a Converged IT/OT SOC

IT/OT/IoT
6 minute read

5 Tips to Leverage Your Endpoint Detection & Response (EDR) Investment

Security Monitoring
5 minute read

The Hidden Threats of Potentially Unwanted Programs (PUPs)

7 minute read

CyberProof Introduces the “Hybrid SOC Approach” at InfoSecurity Europe

3 minute read

4 Tips for Migrating to Microsoft Azure Security Stack

Cloud Migration
4 minute read

Finding the Answers in the Smallest Cracks – a CTI Analyst’s Story

6 minute read

Finding New Balance in the Post-Corona Age

6 minute read

Protecting Your Organization from Ransomware and Cyber Extortion

5 minute read

7 Tips to Securing Office 365

5 minute read

Faced with New Threats, Healthcare Providers Focus on Cyber Security

4 minute read

A Trojan Horse: Protecting Yourself from Malicious Browser Extensions

3 minute read

CyberProof Celebrates International Women’s Day

3 minute read

Wargames – Reducing Cyber Risk with Cyber Attack Simulations

3 minute read

Leveraging Microsoft Sentinel SIEM to Identify Customer-Specific IOCs

Security Monitoring
5 minute read