Threat actor activity in 2020, to date, has been largely shaped by the COVID-19 pandemic – with cyber criminals exploiting the fear and uncertainty created by the pandemic for their own profit....




Forrester – one of the leading technology research firms – recently released a report to help organizations understand the value they can expect from Managed Security Service Providers (MSSPs) in...




Our security needs have grown this year – yet, security budgets in the current economic climate are tighter than ever. 




Technology builds the digital economy – yet, cyber security functions as a key pillar that helps it thrive. This fact has become even clearer this year throughout Australia with the recent...




The reality created by the COVID-19 pandemic has provided troubling opportunities for cyber criminals, who have been capitalizing on and abusing the global confusion. During the last six months,...




Forrester – one of the leading independent technology research firms – recently published its highly respected report: The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020.




The first line of defense for any organization is at the physical perimeter of the building or campus, which may be protected by gates, locks, security guards, closed-circuit TVs, front desk...




MITRE’s Attacker Tactics, Techniques, and Common Knowledge (ATT&CK) framework is a powerful tool for improving cyber defense by creating a smarter security operations center (SOC). 




CyberProof and Microsoft customers are now able to benefit from next-generation cloud-based managed security services to run a smarter and more cost-efficient SOC. This comes at a crucial time for...




5G is the next generation of mobile Internet connectivity, offering 100Xs faster transmission speeds and lower latency – thereby improving network performance, device connections, and application...




CyberProof’s Cyber Threat Intelligence (CTI) team discovered a new cyber crime marketplace using advanced threat intelligence techniques. The marketplace – named, Plugged – deals with multiple ...




This blog was co-authored with Kiran Belsekar, CISO at Aegon Life Insurance.




Tor browser is defined as a “free and open-source software browser for enabling anonymous communication.” Initially released in September 2002, Tor’s intended use is to protect the personal...




Forrester – one of the leading technology research firms – recently released two reports outlining the critical role Managed Security Service Providers (MSSPs) will be playing for their customers. 




A remote workforce needs ongoing training in order to successfully identify and report phishing and other types of cyber attacks. With so many employees based at home due to COVID-19, it’s more...




False and misleading rumors about COVID-19 have been flying around the globe to such an extent that it has been defined by the World Health Organization as an “infodemic” – or, according to some...




With the onset of the COVID-19 pandemic and the decision by nations around the globe to implement a lockdown, business continuity suddenly became the topmost priority for corporate leadership. How...




American IT outsourcer Cognizant is the latest high-profile company that has been hit by the Maze ransomware. Classed as a severe cyber attack, Maze disrupted Cognizant systems and caused service...




The COVID-19 pandemic only underscores what we’ve already known for a while: The old approaches to cyber security aren’t good enough anymore. We need much greater agility - a honed ability to...




Businesses have quickly adapted to utilizing new communication technologies, in this COVID-19 era. Zoom, one of the popular conferencing platforms before the outbreak, is now being used by...




The coronavirus crisis has led to a significant increase in the popularity of video streaming platforms such as Zoom. As a result, cyber criminals are showing greater interest in these platforms...




With the decision of Indian Prime Minister Narendra Modi to implement a country-wide lockdown last Tuesday, as much of a third of humanity is now at home – around 2.6 billion people –according to ...




As threat hunters, we have become increasingly aware of the greater need for diligence and awareness regarding the latest cyber security threat - hackers taking advantage of new vulnerabilities...




How do organizations successfully maintain a strong cyber security stance, with so many staff members working at home due to the novel coronavirus rules and regulations?

Remote workers are likely...




Artificial intelligence (AI) has the potential to completely transform cyber security. But this isn’t news to any security professional. In recent years, the hype surrounding AI and machine...




In the wake of increasingly sophisticated cyber security threats, the pressure on enterprise security teams intensifies. While detection tools have advanced significantly, security  teams continue...




We read in the news that “insiders” are behind many of the largest-scale data breaches. For example, in the Waymo vs. Uber case - which finally got settled last August - Anthony Levandowski,...




What trends can we expect to see  in the cyber security arena? We explored this question with different members of CyberProof’s team and uncovered some interesting predictions.




How does the CyberProof Defense Center (CDC) a Security Orchestration, Automation, and Response (SOAR) platform – help organizations maintain a more effective cyber security strategy and respond...




Part 2 of 2

In part 1 of this blog we discussed how building a use case package requires specific skills – from building effective cyber security threat detection rules in the SIEM to defining...




Part 1 of 2This is part 1 of a 2-part post about the Use Case Factory. If you’d like to more in-depth information about the use case process itself, see part 2.




Robert Muller, the sixth director of the FBI, is quoted as saying, “I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are...




In cyber security circles, the term AI1 means lots of things to different people. But when we talk to customers, we find the term is overused and often misunderstood. So, let’s explore what...




“Be thankful for what you have; you’ll end up having more. If you concentrate on what you don’t have, you will never, ever have enough.” - Oprah Winfrey




CyberProof’s intelligence team uncovered a new threat actor – a user named eurobet.it.DDos, who was previously unknown. The team made this discovery after encountering multiple attempted DDoS...




OSINT (Open Source Intelligence) plays a remarkable role in the universal economy. As this report from IT Intelligence Markets indicates, cyber security threats continue to be developed that allow...




Regional hospital computer networks in Australia were shut down on September 30th due to a hospital ransomware attack – impacting hospitals belonging to the Gippsland Health Alliance and to the...




Outsourcing your SOC operations to a Managed Security Service Provider (MSSP) allows you to sidestep the logistical and financial challenges of maintaining an SOC operation in-house. 




SOC augmentation is all about scaling capabilities with proactive cyber security services from a third-party provider. In recent years, security providers have taken advantage of new technologies...




CyberProof’s analysts have discovered that WSH RAT was leaked on a prominent deep web hacking forum. The leak took place on September 17.




Building a cyber security strategy for an SOC operations from the ground up is a complex process that varies tremendously from one organization to the next. As pointed out in Gartner’s report on ...




Millions of accounts are currently vulnerable to a cyber security threat known as Password Reset Man-in-the-Middle (MitM) attacks – a form of attack that allows even a relatively unsophisticated...




All it takes is one minor mistake for any CISO to be in the spotlight following a cyber attack—who will be next after Target, Under Armour, or Yahoo?




With its data-driven analysis of the current cyber security threat landscape, this year’s Verizon Data Breach Investigation Report (DBIR) is the most extensive to date – covering 86 countries...




The IT ecosystem has undergone a transformation: first, with its move from on-prem, hardware-based systems to distributed, software-based systems in the cloud, then with the shift from single...




Today’s dynamic hybrid cloud environments require a new approach to cyber security. With its DevOps, microservices, containers, and other developments, the current IT environment is required to be...




Even the most skilled and experienced CISOs are facing two significant cyber security challenges—staying ahead of increasingly sophisticated cyber attacks and finding the resources to deal with...




The field of intelligence gathering has gone through tremendous changes – shifting drastically as, in the era of cyber, most intelligence gathering today takes place online. This shift to the...




Any mid-sized to large-sized organization with security ops continuously uncovers a wide range of cyber risks and threats. Some of the things that are discovered can be relatively innocuous, while...




As 2019 is just beginning, we can’t help wondering: What can security service providers expect in the coming year? Tony Velleca, CEO of CyberProof, shares his top cyber security insights and...