Category: Best Practices
-
Beyond Patch Management: The Hidden Danger of Network Scans
Police officers, during a blackout, often check if a neighborhood has regained power by spotting the faint glow of doorbells. This tiny beacon of light, even in an empty house, indicates the restoration of electricity. Similarly, criminals employ surprisingly simplistic methods to identify potential targets. For instance, car thieves casually traverse streets, subtly lifting car…
-
Defending the Classroom: Cybersecurity Threats in Education Systems
Duck, duck, duck… goose! In the classic schoolyard game, the ‘it’ player walks around a circle of seated children, gently tapping their heads and calling them ‘duck.’ Tension builds with every tap until the player chooses an opponent by calling them ‘goose.’ The ‘it’ player runs around the circle and tries to slide into the…
-
Fueling Resilience: Optimization and Adapting the MITRE ATT&CK Framework for Robust Security
Sun Tzu was a Chinese military strategist and general best known as the author of the immortal work, The Art of War, which is still studied and quoted to this day. Sun Tzu was a believer in preparedness prior to battle and believed that battles are often won prior to being fought. One of his…
-
Fortifying Financial Fortunes – Cyber Risk in the Banking Industry
In March 1831, James Honeyman and William J. Murray used forged keys to enter the City Bank of New York, emptying the vault of more than $245,000 in bank money. Boy, how times have changed! In the digital age, criminals don’t need to risk their safety by physically entering a bank. Why would they when…
-
Healthcare Cyber Defense Through Greater Visibility and Early Detection
Extortion is about leverage. The more leverage you can attain, the greater the chance that an extortion attempt will prove successful. A ransomware attack is a classic example of an extortion maneuver. A ransomware gang encrypts the systems and data repositories that an organization’s business operations depend on. At that point, everything grinds to a…
-
Unveiling the Unsung Hero: The Power of Threat Intelligence
Let’s say you’re going on vacation next week to a foreign country. You need to know the weather so you can pack appropriately. You open a weather app, enter your destination, and see that it will be warm, but there’s a slight chance of rain, so you throw an umbrella into your bag. Behind the…
-
Beyond Patch Management: The Hidden Danger of Network Scans
Police officers, during a blackout, often check if a neighborhood has regained power by spotting the faint glow of doorbells. This tiny beacon of light, even in an empty house, indicates the restoration of electricity. Similarly, criminals employ surprisingly simplistic methods to identify potential targets. For instance, car thieves casually traverse streets, subtly lifting car…
-
Defending the Classroom: Cybersecurity Threats in Education Systems
Duck, duck, duck… goose! In the classic schoolyard game, the ‘it’ player walks around a circle of seated children, gently tapping their heads and calling them ‘duck.’ Tension builds with every tap until the player chooses an opponent by calling them ‘goose.’ The ‘it’ player runs around the circle and tries to slide into the…
-
Fueling Resilience: Optimization and Adapting the MITRE ATT&CK Framework for Robust Security
Sun Tzu was a Chinese military strategist and general best known as the author of the immortal work, The Art of War, which is still studied and quoted to this day. Sun Tzu was a believer in preparedness prior to battle and believed that battles are often won prior to being fought. One of his…
-
Fortifying Financial Fortunes – Cyber Risk in the Banking Industry
In March 1831, James Honeyman and William J. Murray used forged keys to enter the City Bank of New York, emptying the vault of more than $245,000 in bank money. Boy, how times have changed! In the digital age, criminals don’t need to risk their safety by physically entering a bank. Why would they when…
-
Healthcare Cyber Defense Through Greater Visibility and Early Detection
Extortion is about leverage. The more leverage you can attain, the greater the chance that an extortion attempt will prove successful. A ransomware attack is a classic example of an extortion maneuver. A ransomware gang encrypts the systems and data repositories that an organization’s business operations depend on. At that point, everything grinds to a…
-
Unveiling the Unsung Hero: The Power of Threat Intelligence
Let’s say you’re going on vacation next week to a foreign country. You need to know the weather so you can pack appropriately. You open a weather app, enter your destination, and see that it will be warm, but there’s a slight chance of rain, so you throw an umbrella into your bag. Behind the…
-
RansomWar in Costa Rica – Conti Ransomware Gang Attacks
Conti, one of today’s most prolific and profitable ransomware groups, launched an initial cyberattack against Costa Rica in mid-April. In recent weeks, the Russian-speaking Conti gang, or possibly an associated group called Hive, have stepped up the attacks and expanded the assault. After Costa Rica refused to pay the initial $10 million ransom or the…
-
Eternity Malware-as-a-Service: A Modular Tool Kit for Threat Actors
An unknown threat actor is selling a new malware toolkit called Eternity Project. Cybercriminals can buy stealers, clippers, worms, miners, ransomware, and DDoS Bots for a few hundred dollars each. What’s most notable about this malware-as-a-service (MaaS) is that in addition to being available on a TOR website, the hacker behind it is brazenly promoting…
-
REvil TOR sites back in action with new ransomware (RaaS) operations
Has REvil re-emerged? That’s the question on everyone’s mind and the topic that’s got the cyber community talking. After months of silence, REvil, the infamous presumed Russian-based ransomware gang, seems to be back online as of last week, with a new leak site promoted on RuTOR. The hacker group’s old site, Happy Blog, has returned,…
-
Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data
Lapsus$ Breaches Okta to Reach Customers’ Sensitive Data Traced back to January of this year, Okta, a publicly traded identity and access management company announced yesterday that it has been impacted by a cyber-attack claimed by the data extortion group Lapsus$. Okta and Lapsus$ disagree regarding the success of the breach, while companies like Cloudflare…
-
Threat Actors Using Omicron COVID-19 Phishing Lures
Over the last few weeks, threat actors have been launching phishing scams which leverage people’s fears and anxieties over the Omicron COVID-19 variant. The scams either inject the Dridex banking malware into a victim’s computer or other malware that collects passwords, credentials, and personal or financial data. Informing all employees about the threat is the…
-
Log4Shell hits big players with critical 0-day exploit
[Last updated Dec. 19, 2021] A recently discovered Log4j vulnerability (Log4Shell, CVE-2021-44228) in the Apache utility that allows unauthenticated remote code execution (RCE) and server take over is said to be exploited in the wild. Due to how widely used the Apache tool is, affecting companies such as Amazon, Apple, Cisco, Steam, Tesla, Twitter, and many…
-
The Role of a SOC During a Cyber Kill Chain
The cybersecurity kill chain, initially defined by Lockheed Martin, continues to be a general standard inside Information Security to describe how a malicious actor, internal or external, performs an attack. The cyber kill chain 7 stages are defined as: Reconnaissance – Identify vulnerabilities, improperly configured services, and obtain credentials through active or passive methods. Weaponization…
-
The Role of Artificial intelligence (AI) in security operations center (SOC)
In the world of digital warfare, Artificial Intelligence is transforming the Security Operation Centers (SOC) to better respond to cybersecurity threats and attacks. Leveraging AI-Based security tools, such as CYREBRO’s SOC Platform, can provide integration features whereby you will be better able to detect and respond to cybercrimes without an in-house SOC team in place. …
-
The Functionality of a SOC in a Red Team vs. Blue Team Exercise
Cybersecurity is a critical component of every business around the world, regardless of size or industry, with the SOC being a key component during the detection and incident response phase. Red Team vs. Blue Team Cybersecurity in a Nutshell The Blue Team stands at the core of Cybersecurity. The foundational elements established in the Blue…
-
How Can a Cloud-Based SOC Help You Detect Internal Threats?
Businesses worldwide are continuously at risk from external threats which are looking for a way in, be it by phishing or vulnerabilities. Once they enter your infrastructure or software, they can then use it to pivot and move into sensitive data, stealing it, or destroying it to obtain a profit. Internal threats have increased rapidly…
-
Navigating Cybersecurity Compliance Challenges
Over the past few decades, the business world shifted from filing cabinets overflowing with paperwork to a cloud-first approach where pen and paper are obsolete. Today we live in an almost limitless digital world that has afforded well-intentioned businesses with uncountable advantages. However, as our reliance on technology has grown, so too has the threat…
-
Are Backdoors Sitting in Your Environment?
Have you ever hidden a house key under a doormat or flowerpot on your porch for a trusted friend to use on occasion? Have you ever made a copy to give to one of your neighbors to use in emergency situations when you are out of town? Ever tape a key to your car underneath…
-
Building A Cybersecurity Compliance Program
As if IT managers and CIOs didn’t have enough on their plates already, many are finding themselves with another heaping scoop of responsibility to manage: compliance. Various regulatory bodies set compliance requirements, which differ from country to country or even state to state in the US. For a company to be compliant, it must meet…
-
Today’s Cyber Challenge: Multi-Site Security With a Diverse Tech Stack
In today’s globalized economy, it’s easier than ever for businesses to operate in multiple locations, with many crossing borders to reach a broader customer base. While this can bring many benefits, it can also create significant challenges, particularly when managing IT and cybersecurity. As organizations increase their reach, they must work with service providers in…
-
From GDPR to CCPA – Staying Ahead of the Curve in a Rapidly Changing Regulatory Landscape
In 1986, the United States enacted a vital piece of legislation known as the Computer Fraud and Abuse Act (CFAA) to address a rise in computer-related crimes. CFAA made many computer-based offenses illegal, including hacking, computer trespassing, unauthorized access to computers and computer networks, and using computers to commit fraud or access national security information.…
-
The Benefits of Choosing a Reliable MSSP (Part 2 of 2)
Businesses are facing an uphill battle when it comes to cybersecurity. The number of threat actors is multiplying daily, as are their skills and attacks. Simultaneously, security leaders, already dealing with staff and skills shortages, must do more with lower budgets. How can a business amp up its security in such turbulent times? In a…
-
Dark Reading panel – The Next Generation SOC with CYREBRO CEO Nadav Arbel
SOCs are taking the center stage as the defenders of the network but many organizations don’t fully understand how to leverage a SOC, leaving them in the dark about the real value they provide. On March 24, CYREBRO’s CEO and founder Nadav Arbel sat together with Ryan Alban Sr. Manager of Global Solution Leads at…
-
CISO Series Podcast Featuring CYREBRO’s CTO, Ori Arbel – What’s Next in Security?
In this episode of CISO Series, we CYREBRO’s CTO, Ori Arbel, discussing the latest cybersecurity trends with the show hosts, cybersecurity journalist, David Spark, and veteran CISO, Andy Ellis. From the start of COVID and the cloud migration rush that followed, to practical tips to help improve incident response planning, the group discusses how to…
-
Women: A Powerful Part of Any Cybersecurity Company
On March 8th, our company will proudly celebrate International Women’s Day. While this year’s theme, Break the Bias, applies to women in every professional field and country, we find it particularly relevant to the cybersecurity industry. Gender bias has gone on for too long. Many women haven’t been given the recognition and opportunities they deserve. …
-
Top Value Added Distributor, Infinigate, Strengthens Cyber Solutions with Selection of CYREBRO’s SOC Platform
Europe’s top value-added distributor has selected CYREBRO’s interactive cloud-based platform to provide an easy to implement, cost-effective solution to MS(S)Ps across Europe MUNICH, GERMANY and TEL AVIV, ISRAEL — AUGUST 10, 2021 – CYREBRO, the only interactive SOC platform solution for SMBs, today announced that Infinigate, Europe’s largest purveyor of cybersecurity solutions, will be using…
-
Nadav Arbel of CYREBRO Named Finalist for Top 10 Cybersecurity Expert for 2021 by Cyber Defense Magazine
TEL AVIV, ISRAEL — AUGUST 2, 2021 – CYREBRO, the only interactive SOC platform solution for SMBs, today announced that CEO and co-founder Nadav Arbel has been named a Finalist in the Top 10 Cybersecurity Experts for 2021 category at the Black Unicorn Awards for 2021 which take place annually at the Black Hat USA…
-
We Are CYREBRO and This Is How We Are Revolutionizing Cybersecurity Operations
When we first established our company, our goal was clear. We were on a mission to provide strategic support to Fortune 500 companies by helping them optimize their cybersecurity posture. Our way to do this was to leverage our team’s real-world experiences and deep domain expertise in cyber-forensics investigations, IR, and ethical hacking to provide…