CyberProof Research Team
Our Cyber Research Team is always on the lookout for the latest threats facing the digital ecosystem. Stay ahead of the risks so you don't need to find out about them after they become your next attackers.
Coyote Banking Trojan Extends Reach & Targets Users through WhatsApp
7 minute read
Malware
Breaking Down Black Basta’s Advanced Phishing Strategies
9 minute read
Threat Research
Minimize Downtime: How to Build a Cyber Resilient Business
8 minute read
The Dangers of Insecure IoT: How to Protect Yourself from IoT Attacks
8 minute read
IoT Attacks
Reduce Your Cyber Attack Surface: How Threat Intelligence Can Help
8 minute read
cyber attack
How MITRE ATT&CK Helps In Improving Your Cyber Defense
8 minute read
MITRE ATTACK
Minimize Cloud Risks: Essential Cloud Security Monitoring Tools and Techniques
9 minute read
Cybersecurity
How Security Visibility Empowers Your Defense
9 minute read
Security Operations
Stop OT Disruptions: 5 Ways to Improve Your Operational Technology Security
9 minute read
OT Security
AI Data Security: Key Threats and Protection
12 minute read
Data Security
CyberProof Acquires Interpres Security to Revolutionize Continuous Threat Exposure Management
7 minute read
Proactive SecOps for financial organizations in 2025
5 minute read
BFSI
What is CTEM?
12 minute read
CTEM
A Guide to the Windows BSOD Crisis, Following CrowdStrike’s Update
2 minute read
Microsoft
Palo Alto QRadar Acquisition: Impacts on Cloud-Native SIEMs
7 minute read
AI
CyberProof announces strategic partnership with Google Cloud
4 minute read
Targeted Threat Intelligence: Turning Challenges to Opportunities
7 minute read
Cyberattack
Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022
4 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022
7 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022
3 minute read
Cyber Warfare
Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022
4 minute read
Cyber Warfare
Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day
2 minute read
Cyber Alerts
Holiday Season Cyber Threats
7 minute read
Faced with New Threats, Healthcare Providers Focus on Cyber Security
7 minute read
Threat Research
7 Insights on SolarWinds SUNBURST – the “Cyber Pearl Harbor”
5 minute read
Threat Research
Identifying Spear Phishing Attacks – What Remote Workers Need to Know
5 minute read
Threat Research
Cyber Criminals Target IT Services Company Using Maze Ransomware
6 minute read
Ransomware
Hackers Use Widespread Zoom Mode to Increase Attacks
3 minute read
Cyber Alerts
A New Cyber Security Threat – Hackers Take Advantage of Coronavirus
3 minute read
Threat Research
Artificial Intelligence and Threat Intelligence: Better Together
5 minute read
Threat Intelligence
CyberProof Research Team Detects Multiple DDoS Attacks
3 minute read
Threat Research
4 Steps to Protect Your Privacy During an Online Investigation
5 minute read
WSH RAT is leaked on a Deep Web Forum – for Free
3 minute read