SPEAK WITH AN EXPERT

CyberProof Research Team

Our Cyber Research Team is always on the lookout for the latest threats facing the digital ecosystem. Stay ahead of the risks so you don't need to find out about them after they become your next attackers.

Coyote Banking Trojan Extends Reach & Targets Users through WhatsApp

7 minute read

Malware

Breaking Down Black Basta’s Advanced Phishing Strategies

9 minute read

Threat Research

Minimize Downtime: How to Build a Cyber Resilient Business

8 minute read

The Dangers of Insecure IoT: How to Protect Yourself from IoT Attacks

8 minute read

IoT Attacks

Reduce Your Cyber Attack Surface: How Threat Intelligence Can Help

8 minute read

cyber attack

How MITRE ATT&CK Helps In Improving Your Cyber Defense

8 minute read

MITRE ATTACK

Minimize Cloud Risks: Essential Cloud Security Monitoring Tools and Techniques

9 minute read

Cybersecurity

How Security Visibility Empowers Your Defense

9 minute read

Security Operations

Stop OT Disruptions: 5 Ways to Improve Your Operational Technology Security

9 minute read

OT Security

AI Data Security: Key Threats and Protection

12 minute read

Data Security

CyberProof Acquires Interpres Security to Revolutionize Continuous Threat Exposure Management 

7 minute read

Proactive SecOps for financial organizations in 2025

5 minute read

BFSI

What is CTEM?

12 minute read

CTEM

A Guide to the Windows BSOD Crisis, Following CrowdStrike’s Update

2 minute read

Microsoft

Palo Alto QRadar Acquisition: Impacts on Cloud-Native SIEMs

7 minute read

AI

CyberProof announces strategic partnership with Google Cloud

4 minute read

Google

Targeted Threat Intelligence: Turning Challenges to Opportunities

7 minute read

Cyberattack

Recent Developments in Russian-Ukrainian Cyber Warfare, April 6, 2022

4 minute read

Cyber Warfare

Recent Developments in Russian-Ukrainian Cyber Warfare, March 23, 2022

7 minute read

Cyber Warfare

Recent Developments in Russian-Ukrainian Cyber Warfare, March 15, 2022

3 minute read

Cyber Warfare

Recent Developments in Russian-Ukrainian Cyber Warfare, March 3, 2022

4 minute read

Cyber Warfare

Mitigating an Exploit in the Log4j2 Logging Library – RCE Zero-day

2 minute read

Cyber Alerts

Holiday Season Cyber Threats

7 minute read

Faced with New Threats, Healthcare Providers Focus on Cyber Security

7 minute read

Threat Research

7 Insights on SolarWinds SUNBURST – the “Cyber Pearl Harbor”

5 minute read

Threat Research

Identifying Spear Phishing Attacks – What Remote Workers Need to Know

5 minute read

Threat Research

Cyber Criminals Target IT Services Company Using Maze Ransomware

6 minute read

Ransomware

Hackers Use Widespread Zoom Mode to Increase Attacks

3 minute read

Cyber Alerts

A New Cyber Security Threat – Hackers Take Advantage of Coronavirus

3 minute read

Threat Research

Artificial Intelligence and Threat Intelligence: Better Together

5 minute read

Threat Intelligence

CyberProof Research Team Detects Multiple DDoS Attacks

3 minute read

Threat Research

4 Steps to Protect Your Privacy During an Online Investigation

5 minute read

WSH RAT is leaked on a Deep Web Forum – for Free

3 minute read

Threat Research