-
In Cybersecurity, What You Can’t See Can Hurt You
16.6.2022
The dangers to SMBs and businesses of all sizes from cyberattacks are well known. But what’s driving these attacks, and what do cybersecurity stakeholders need to do that they’re not already doing?
-
9 types of computer virus and how they do their dirty work
10.6.2022
From macro viruses and boot sector viruses to droppers and packers, here’s a look at 9 common virus types, what they do, and the function they perform for attackers.
-
5 tips for SMBs to prevent ransomware attacks
17.5.2022
Small-hit ransomware attacks are targeting small- to mid-sized businesses (SMBs) around the country.
-
What is spear phishing? Examples, tactics, and techniques
10.4.2022
Spear phishing is a targeted email attack purporting to be from a trusted sender. Learn how to recognize—and defeat—this type of phishing attack.
-
The Widening Cybersecurity Talent Gap And Its Ramifications In 2022
28.1.2022
Whether you’re a small business with a handful of employees or a massive enterprise conglomerate, hackers do not care. They all see the same thing: another victim waiting to be exploited.
-
אפשר לנהל את כל מוצרי האבטחה של הארגון במוצר תשתיתי אחד
22.12.2021
כשהמחסור במקצועני סייבר הולך ומחריף, והכלים מסובכים לתפעול - ארגונים מתקשים לוודא שהם מוגנים. לראשונה בתחום הסייבר, CYREBRO מציעה תשתית SOC מנוהלת לפי צרכי הלקוח
-
Nadav Arbel of CYREBRO Named Finalist for Top 10 Cybersecurity Expert for 2021 by Cyber Defense Magazine
2.8.2021
TEL AVIV, ISRAEL — AUGUST 2, 2021 – CYREBRO, the only interactive SOC platform solution for SMBs, today announced that CEO and co-founder Nadav Arbel has been named a Finalist in the Top 10 Cybersecurity Experts for 2021 category at the Black Unicorn Awards for 2021 which take place annually at the Black Hat USA…
-
CyberHat Secures $15 Million to Expand its CYREBRO Enterprise-Level Cybersecurity Protection to Small and Medium Sized Businesses
21.4.2021
Only a central cyber brain with sophisticated cross-function detection of suspicious activity and text. Truncating description after two lines. Only a central cyber brain with sophisticated cross-function detection of suspicious activity and text. Truncating description after two lines. Only a central cyber brain with sophisticated cross-function detection of suspicious activity and text. Truncating description after two lines.