Resources

Learn about CYREBRO’s platform, technology, and capabilities, read about industry insights, watch webinars with cyber experts, and much more in the resources below.  

  • The 6 Critical Capabilities of a Complete SOC Solution
    E-books

    The 6 Critical Capabilities of a Complete SOC Solution

    A SOC solution is an ideal way for businesses to maintain proper protection and response against cyberattacks, especially before they occur.

  • 7 Steps to Effective Incident Response
    E-books

    7 Steps to Effective Incident Response

    This guide is meant to help you take the first steps to creating an effective incident response plan. Every organization is different, so use this guide as a framework to create an incident response plan (IRP) that is uniquely tailored to your organization.  

  • GoDaddy Data Breach Affects 1.2M Costumers
    Threat Intelligence

    GoDaddy Data Breach Affects 1.2M Costumers

    GoDaddy, the web-hosting giant, has disclosed it has suffered from a data breach. The attackers have gained access to GoDaddy’s Managed WordPress hosting environment. Although the breach was discovered on November 17, according to GoDaddy’s investigation the attackers have infiltrated the systems on September 6. The attackers have gained access to the following information: Up…

  • Cisco has released updates fixing critical RCE vulnerabilities
    Threat Intelligence

    Cisco has released updates fixing critical RCE vulnerabilities

    Cisco has released updates fixing multiple critical vulnerabilities in Cisco Policy Suite and Cisco Catalyst PON Series Switches Optical Network Terminal. Successful exploitation of the vulnerabilities may lead to Remote Code Execution and Full System Compromise. The Vulnerabilities CVE-2021-40119(CVSS 3.1: 9.8, Critical) A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system…

  • The Real State of DevSecOps and Where It’s Going
    E-books

    The Real State of DevSecOps and Where It’s Going

    Get the ultimate 2021 DevSecOps guide to bolster the capabilities of your DevSecOps team. Find out about the challenges facing the field, what to watch out for, how to boost protection, and key takeaways regarding consolidation, compartmentalization, and accountability.

  • Maximize Your Existing Systems to Harden Your Security Posture
    Webinars

    Maximize Your Existing Systems to Harden Your Security Posture

    To combat the ever-growing threat of cyber-attacks from actors who are becoming more and more sophisticated, organizations are investing in DevSecOps to embed security deep into the development process. This also means that it’s also critical to stay on top of the quickly evolving DevSecOps tools and tactics.

  • Hedge Fund Case Study
    Case Studies

    Hedge Fund Case Study

    The company is one of the top US hedge funds in the alternative investment space and invests in various public equity markets including financial, telecom, healthcare, and industrial companies, on a global scale

  • The 6 Critical Capabilities of a Complete SOC Solution
    E-books

    The 6 Critical Capabilities of a Complete SOC Solution

    A SOC solution is an ideal way for businesses to maintain proper protection and response against cyberattacks, especially before they occur.

  • 7 Steps to Effective Incident Response
    E-books

    7 Steps to Effective Incident Response

    This guide is meant to help you take the first steps to creating an effective incident response plan. Every organization is different, so use this guide as a framework to create an incident response plan (IRP) that is uniquely tailored to your organization.  

  • The Real State of DevSecOps and Where It’s Going
    E-books

    The Real State of DevSecOps and Where It’s Going

    Get the ultimate 2021 DevSecOps guide to bolster the capabilities of your DevSecOps team. Find out about the challenges facing the field, what to watch out for, how to boost protection, and key takeaways regarding consolidation, compartmentalization, and accountability.

  • GoDaddy Data Breach Affects 1.2M Costumers
    Threat Intelligence

    GoDaddy Data Breach Affects 1.2M Costumers

    GoDaddy, the web-hosting giant, has disclosed it has suffered from a data breach. The attackers have gained access to GoDaddy’s Managed WordPress hosting environment. Although the breach was discovered on November 17, according to GoDaddy’s investigation the attackers have infiltrated the systems on September 6. The attackers have gained access to the following information: Up…

  • Cisco has released updates fixing critical RCE vulnerabilities
    Threat Intelligence

    Cisco has released updates fixing critical RCE vulnerabilities

    Cisco has released updates fixing multiple critical vulnerabilities in Cisco Policy Suite and Cisco Catalyst PON Series Switches Optical Network Terminal. Successful exploitation of the vulnerabilities may lead to Remote Code Execution and Full System Compromise. The Vulnerabilities CVE-2021-40119(CVSS 3.1: 9.8, Critical) A vulnerability in the key-based SSH authentication mechanism of Cisco Policy Suite could allow an unauthenticated, remote attacker to log in to an affected system…

  • Apache Patches Critical Apache HTTP Server RCE Vulnerability Exploited-in-the-Wild
    Threat Intelligence

    Apache Patches Critical Apache HTTP Server RCE Vulnerability Exploited-in-the-Wild

    Apache Software has released an update patching critical remote code execution vulnerability in Apache HTTP Server. A PoC (Proof of Concept) exploit has been published, and the vulnerability has been seen exploited in the wild. The vulnerability CVE-2021-41773 Path traversal vulnerability allowing RCE A vulnerability was found in a change made to path normalization in Apache…

  • Google Patches Critical Vulnerabilities in Chrome
    Threat Intelligence

    Google Patches Critical Vulnerabilities in Chrome

    Google has released an emergency update to fix 3 vulnerabilities in Chrome, 2 of them are being exploited in the wild.

  • Maximize Your Existing Systems to Harden Your Security Posture
    Webinars

    Maximize Your Existing Systems to Harden Your Security Posture

    To combat the ever-growing threat of cyber-attacks from actors who are becoming more and more sophisticated, organizations are investing in DevSecOps to embed security deep into the development process. This also means that it’s also critical to stay on top of the quickly evolving DevSecOps tools and tactics.