EDR vs. SIEM – Which Approach is Best in 2022?
By Arik Day. January 7, 2021
Defending an enterprise’s infrastructure successfully requires using multiple products that – when fit together effectively – create a comprehensive, multilayer defense.
7 Insights on SolarWinds SUNBURST – the “Cyber Pearl Harbor”
By CyberProof Research Team. December 30, 2020
Finding the Right MDR Provider - Our Takeaways from Forrester NowTech
By Ben Chant. December 16, 2020
Forrester’s recent report ‘NowTech: Managed Detection And Response Services Providers, Q4 2020’ provides an overview of Managed Detection and Response (MDR) vendors and the capabilities that...
Targeted Threat Intelligence: Turning Challenges to Opportunities in 2022
By CyberProof Research Team. December 15, 2020
Threat intelligence has become a near-universal component of modern cyber security strategies. According to a recent SANS CTI survey, in 2020 we saw more personnel dedicated to CTI functions than...
The Smarter SOC Summit Recap –Innovation, Insight, and Fun!
By Aliza Israel. November 23, 2020
We’re excited to share that CyberProof’s recent virtual event, The Smarter SOC Summit, was a huge success – bringing together top cyber security professionals from around the globe to focus on...
Developing a Smarter SOC with Microsoft Azure Security Services & CyberProof
By Ben Chant. November 18, 2020
Security teams are struggling to reduce the time to detect and respond due to the complexity and volume of alerts being generated from multiple security technologies.
How Retailers Can Ensure Consumer Data Protection This Holiday Season
By Mahesh Athalye. November 5, 2020
It’s been an upside-down year where none of the old rules seem to apply – even to Christmas shopping. For retailers, this year’s holiday season is starting earlier than ever and is expected to...
Cyber Security Trends – What We’ve Learned in 2020
By Nethaniel Ribco. October 19, 2020
Threat actor activity in 2020 was been largely shaped by the COVID-19 pandemic – with cyber criminals exploiting the fear and uncertainty created by the pandemic for their own profit. Threat actors...
Our Key Takeaways from Forrester’s APAC MSSP Market Research Report
By Ben Chant. October 12, 2020
Forrester – one of the leading technology research firms – recently released a report to help organizations understand the value they can expect from Managed Security Service Providers (MSSPs) in...
How to Prioritize Your 2021 Cyber Security Budget – 5 Tips for CISOs
By Tony Velleca. September 14, 2020
Our security needs have grown this year – yet, security budgets in the current economic climate are tighter than ever.
Combating the Increased Cyber Security Threats in Australia
By Anand Trivedi. September 1, 2020
Technology builds the digital economy – yet, cyber security functions as a key pillar that helps it thrive. This fact has become even clearer this year throughout Australia with the recent escalation...
Scammers Cash In – Stealing COVID-19 Unemployment Relief
By Nethaniel Ribco. August 24, 2020
The reality created by the COVID-19 pandemic has provided troubling opportunities for cyber criminals, who have been capitalizing on and abusing the global confusion. During the last six months,...
Our 5 Key Takeaways from Forrester’s MSSP Wave™ Report
By Ben Chant. August 12, 2020
Forrester – one of the leading independent technology research firms – recently published its highly respected report: The Forrester Wave™: Midsize Managed Security Services Providers, Q3 2020.
The first line of defense for any organization is at the physical perimeter of the building or campus, which may be protected by gates, locks, security guards, closed-circuit TVs, front desk...
CyberProof and Microsoft customers are now able to benefit from next-generation cloud-based managed security services to run a smarter and more cost-efficient SOC. This comes at a crucial time for...
5G Will Redefine Cyber Security Operations
By Tony Velleca. June 25, 2020
5G is the next generation of mobile Internet connectivity, offering 100Xs faster transmission speeds and lower latency – thereby improving network performance, device connections, and application...
CyberProof’s Cyber Threat Intelligence (CTI) team discovered a new cyber crime marketplace using advanced threat intelligence techniques. The marketplace – named, Plugged – deals with multiple ...
Returning to the Office? 7 Data Hygiene and Security Monitoring Tips
By Anand Trivedi. June 11, 2020
This blog was co-authored with Kiran Belsekar, CISO at Aegon Life Insurance.
An Analysis of the Security Risks Posed by Tor Browser
By Nethaniel Ribco. June 4, 2020
Tor browser is defined as a “free and open-source software browser for enabling anonymous communication.” Initially released in September 2002, Tor’s intended use is to protect the personal privacy...
Forrester – one of the leading technology research firms – recently released two reports outlining the critical role Managed Security Service Providers (MSSPs) will be playing for their customers.
Identifying Spear Phishing Attacks - What Remote Workers Need to Know
By CyberProof Research Team. May 19, 2020
A remote workforce needs ongoing training in order to successfully identify and report phishing and other types of cyber attacks. With so many employees based at home due to COVID-19, it’s more...
8 Tips for Spotting Fake News
By Fabio Lior Rahamim. May 10, 2020
False and misleading rumors about COVID-19 have been flying around the globe to such an extent that it has been defined by the World Health Organization as an “infodemic” – or, according to some...
New Rules of the Game – Business Cyber Security with COVID-19
By Aman Malhotra. April 30, 2020
With the onset of the COVID-19 pandemic and the decision by nations around the globe to implement a lockdown, business continuity suddenly became the topmost priority for corporate leadership. How...
Cyber Criminals Target IT Services Company Using Maze Ransomware
By CyberProof Research Team. April 22, 2020
American IT outsourcer Cognizant is the latest high-profile company that has been hit by the Maze ransomware. Classed as a severe cyber attack, Maze disrupted Cognizant systems and caused service...
5 Insights for the Next Era in Cyber Security
By Aliza Israel. April 21, 2020
The COVID-19 pandemic only underscores what we’ve already known for a while: The old approaches to cyber security aren’t good enough anymore. We need much greater agility - a honed ability to quickly...
Threat Actors Share Zoom Hacking Methods on the Dark Web
By Niv DavidPur. April 8, 2020
Businesses have quickly adapted to utilizing new communication technologies, in this COVID-19 era. Zoom, one of the popular conferencing platforms before the outbreak, is now being used by...
Hackers Capitalize on Widespread Zoom Use to Increase Malicious Attacks
By CyberProof Research Team. April 3, 2020
The coronavirus crisis has led to a significant increase in the popularity of video streaming platforms such as Zoom. As a result, cyber criminals are showing greater interest in these platforms and...
The New Normal – Staying “Cyber Safe” with Remote Workers
By Tony Velleca. April 2, 2020
With the decision of Indian Prime Minister Narendra Modi to implement a country-wide lockdown last Tuesday, as much of a third of humanity is now at home – around 2.6 billion people –according to ...
A New Cyber Security Threat - Hackers Take Advantage of Coronavirus
By CyberProof Research Team. March 22, 2020
As threat hunters, we have become increasingly aware of the greater need for diligence and awareness regarding the latest cyber security threat - hackers taking advantage of new vulnerabilities...
Cyber Security Guidelines & Best Practices for Remote Work Security
By Shiran Grinberg. March 19, 2020
How do organizations successfully maintain a strong cyber security stance, with so many staff members working at home due to the novel coronavirus rules and regulations?
Remote workers are likely to...
Artificial Intelligence and Threat Intelligence: Better Together
By CyberProof Research Team. March 11, 2020
Artificial intelligence (AI) has the potential to completely transform cyber security. But this isn’t news to any security professional. In recent years, the hype surrounding AI and machine learning...
Security Automation: The Key to a Smarter SOC
By Tony Velleca. March 3, 2020
In the wake of increasingly sophisticated cyber security threats, the pressure on enterprise security teams intensifies. While detection tools have advanced significantly, security teams continue to...
Cyber Insider Threats - A Looming Security Risk
By Sinu Peter. February 26, 2020
We read in the news that “insiders” are behind many of the largest-scale data breaches. For example, in the Waymo vs. Uber case - which finally got settled last August - Anthony Levandowski, former...
5 Threat Predictions and Cyber Security Trends
By Aliza Israel. February 17, 2020
What trends can we expect to see in the cyber security arena? We explored this question with different members of CyberProof’s team and uncovered some interesting predictions.
How the CyberProof Defense Center Changed My Life as a Security Analyst
By Hen Porcilan. February 3, 2020
How does the CyberProof Defense Center (CDC) a Security Orchestration, Automation, and Response (SOAR) platform – help organizations maintain a more effective cyber security strategy and respond to...
Up for the Hunt? Why Security Operations Should Include Threat Hunting
By Tomer Ohayon. December 16, 2019
Robert Muller, the sixth director of the FBI, is quoted as saying, “I am convinced that there are only two types of companies: those that have been hacked and those that will be. And even they are...
How AI Can Improve Your SOC Efficiency
By Tony Velleca. December 2, 2019
In cyber security circles, the term AI1 means lots of things to different people. But when we talk to customers, we find the term is overused and often misunderstood. So, let’s explore what exactly...
5 Cyber Health Strategies We Can All Be Thankful For
By Aliza Israel. November 27, 2019
“Be thankful for what you have; you’ll end up having more. If you concentrate on what you don’t have, you will never, ever have enough.” - Oprah Winfrey
CyberProof Research Team Detects Multiple DDoS Attacks
By CyberProof Research Team. November 7, 2019
CyberProof’s intelligence team uncovered a new threat actor – a user named eurobet.it.DDos, who was previously unknown. The team made this discovery after encountering multiple attempted DDoS attacks...
4 Steps to Protect Your Privacy During an Online Investigation
By CyberProof Research Team. November 6, 2019
OSINT (Open Source Intelligence) plays a remarkable role in the universal economy. A report from IT Intelligence Markets indicates, cyber security threats continue to be developed that allow tools...
What You Need to Know About the Recent Hospital Ransomware Attacks
By Moran Tomer. October 30, 2019
Regional hospital computer networks in Australia were shut down on September 30th due to a hospital ransomware attack – impacting hospitals belonging to the Gippsland Health Alliance and to the South...
How to Find the Right Managed Security Service Provider
By Nir Rubin. October 3, 2019
Outsourcing your SOC operations to a Managed Security Service Provider (MSSP) allows you to sidestep the logistical and financial challenges of maintaining an SOC operation in-house.
5 SOC Augmentation Lessons for Proactive Cyber Security
By Tony Velleca. September 24, 2019
SOC augmentation is all about scaling capabilities with proactive cyber security services from a third-party provider. In recent years, security providers have taken advantage of new technologies to...
WSH RAT is leaked on a Deep Web Forum – for Free
By CyberProof Research Team. September 18, 2019
CyberProof’s analysts have discovered that WSH RAT was leaked on a prominent deep web hacking forum. The leak took place on September 17.
10 Tips to Step Up Your SOC Operations
By Aliza Israel. September 5, 2019
Building a cyber security strategy for SOC operations from the ground up is a complex process that varies tremendously from one organization to the next. As pointed out in Gartner’s report on How to...
How to Prevent Man in the Middle Attacks - Proven Methods for 2022
By Hen Porcilan. August 26, 2019
Millions of accounts are currently vulnerable to a cyber security threat known as Password Reset Man-in-the-Middle (MitM) attacks – a form of attack that allows even a relatively unsophisticated...
5 Tips for Successful Implementation of Cyber Security Strategy
By Bruce Roton. August 19, 2019
All it takes is one minor mistake for any CISO to be in the spotlight following a cyber attack—who will be next after Target, Under Armour, or Yahoo?
7 Takeaways from the Verizon 2019 Data Breach Report
By Aliza Israel. July 18, 2019
With its data-driven analysis of the current cyber security threat landscape, this year’s Verizon Data Breach Investigation Report (DBIR) is the most extensive to date – covering 86 countries based...
5 Trends That are Changing the Face of Security Operations
By Eran Alsheh. June 26, 2019
The IT ecosystem has undergone a transformation: first, with its move from on-prem, hardware-based systems to distributed, software-based systems in the cloud, then with the shift from single cloud...
Today’s dynamic hybrid cloud environments require a new approach to cyber security. With its DevOps, microservices, containers, and other developments, the current IT environment is required to be...