Resources
Learn about CYREBRO’s platform, technology, and capabilities, read about industry insights, watch webinars with cyber experts, and much more in the resources below.
-
Guides & E-books
Unmask Threats in the Age of AI: Your Guide to AI-Powered Cybersecurity
In just the last few years, AI-driven attacks have proven to be significantly deadlier, but it can also be our defense.
-
Guides & E-books
Mastering Cybersecurity Compliance: Your Guide to Navigating a Complex Landscape
Achieve and maintain cybersecurity compliance while enhancing your organization's security posture.
-
Case Studies
WannaCry Ransomware Worm: CYREBRO IR Case Study
CYREBRO was monitoring and collecting logs from the casino’s network and identified an unusual network traffic spike. CYREBRO initiated an investigation, revealing the presence of the notorious worm.
-
Case Studies
Data Leak Prevented: CYREBRO Brute-Force Case Study
This nonprofit organization has been running for 50 years, providing aid, and distributing relief on a national level. CYREBRO launched an investigation after detecting suspicious activity on the organization’s database server.
-
Threat Intelligence
Critical MiniOrange Social Login and Register Plugin Vulnerability
June 29, 2023 A critical security flaw has been discovered in the WordPress “MiniOrange Social Login and Register” plugin. Successful exploitation may allow unauthenticated threat actor to gain access to any account on a site including accounts used to administer the site, if the attacker knows, or can find, the associated email address. The Vulnerability…
-
Podcast & Webinars
Business Lockdown: High-Impact Breaches of Common Attacker Entry Points
Common attacker entry points most SMBs will experience, real SOC investigations that dealt with these entry points, and best practices for reducing cybersecurity risk.
-
Case Studies
WannaCry Ransomware Worm: CYREBRO IR Case Study
CYREBRO was monitoring and collecting logs from the casino’s network and identified an unusual network traffic spike. CYREBRO initiated an investigation, revealing the presence of the notorious worm.
-
Case Studies
Data Leak Prevented: CYREBRO Brute-Force Case Study
This nonprofit organization has been running for 50 years, providing aid, and distributing relief on a national level. CYREBRO launched an investigation after detecting suspicious activity on the organization’s database server.
-
Case Studies
Ransomware Attack Prevented: CYREBRO Incident Response Case Study
A global manufacturing company was established well over a century ago, with over 5,000 employees today and an annual revenue of over 1 billion USD.
-
Case Studies
Hedge Fund Case Study
The company is one of the top US hedge funds in the alternative investment space and invests in various public equity markets including financial, telecom, healthcare, and industrial companies, on a global scale.
-
Guides & E-books
Unmask Threats in the Age of AI: Your Guide to AI-Powered Cybersecurity
In just the last few years, AI-driven attacks have proven to be significantly deadlier, but it can also be our defense.
-
Guides & E-books
Mastering Cybersecurity Compliance: Your Guide to Navigating a Complex Landscape
Achieve and maintain cybersecurity compliance while enhancing your organization's security posture.
-
Guides & E-books
5 Common Attacker Entry Points
Cyberattacks against SMBs are increasing at an alarming pace, but your company doesn't have to become the next victim.
-
Guides & E-books
Cyber Insurance Coverage Checklist
Previously, attaining a cyber insurance policy demanded as little as an antivirus and a computer, today it's become much more difficult.
-
Guides & E-books
2022 Fraud and Email Compromise Analysis Report
This report details analysis that CYREBRO performed to understand the leading causes of a fraud attack, and what your organization can do to protect itself from fraud and email compromise.
-
Guides & E-books
Incident Response Analysis Report
After analyzing numerous internal incident response (IR) reports, CYREBRO discovered a shocking statistic: 75% of reported security incidents were caused by inadequate investment in security solutions that caused blind spots in network visibility. Given that a single, minor blind spot can put your business at risk, ensuring that you achieve 100% visibility is critical.
-
Podcast & Webinars
Business Lockdown: High-Impact Breaches of Common Attacker Entry Points
Common attacker entry points most SMBs will experience, real SOC investigations that dealt with these entry points, and best practices for reducing cybersecurity risk.
-
Podcast & Webinars
Evolution of Cyber Insurance and the Growing SOC Requirement
The evolution of cyber insurance, drivers for new policy requirements, and how a SOC is a must-have for businesses that want to reduce cybersecurity risks.
-
Podcast & Webinars
Dark Reading Panel: Next Gen SOC with CYREBRO CEO Nadav Arbel
Learn about the new tools and practices that are being added to today’s SOCs such as threat hunting capabilities, tools such as XDR and orchestration, and more.
-
Podcast & Webinars
CISO Series Podcast Featuring CYREBRO’s CTO, Ori Arbel – What’s Next in Security
How do CISOs digest the latest cybersecurity trends of 2022? What struggles do companies deal with surrounding cloud migrations and how can they overcome them?
-
Podcast & Webinars
Maximize Your Existing Systems to Harden Your Security Posture
To combat the ever-growing threat of cyber-attacks from actors who are becoming more and more sophisticated, organizations are investing in DevSecOps to embed security deep into the development process. This also means that it’s also critical to stay on top of the quickly evolving DevSecOps tools and tactics.
-
Threat Intelligence
Critical MiniOrange Social Login and Register Plugin Vulnerability
June 29, 2023 A critical security flaw has been discovered in the WordPress “MiniOrange Social Login and Register” plugin. Successful exploitation may allow unauthenticated threat actor to gain access to any account on a site including accounts used to administer the site, if the attacker knows, or can find, the associated email address. The Vulnerability…
-
Threat Intelligence
Grafana Patches Critical Vulnerability due to Azure Integration
June 26, 2023 Grafana has released a security patch for a critical Authentication Bypass vulnerability found in multiple versions of its application. This vulnerability allows attackers to bypass authentication and gain control over any Grafana account that uses Azure Active Directory OAuth with a multi-tenant Azure application and that do not have allowed_groups configured. Grafana is…
-
Threat Intelligence
VMware Patches Critical Vulnerabilities in vCenter Server
June 25, 2023 VMware has patched a number of high-severity vulnerabilities in vCenter Server that may allow attackers to gain code execution and bypass authentication on unpatched systems. The Vulnerabilities CVE-2023-20892 (CVSS 3.1: 8.1, High-severity) – a heap-overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol, a malicious…
-
Threat Intelligence
Fortinet Patches Critical RCE Vulnerability in FortiNAC
June 25, 2023 Fortinet has updated FortiNAC to address various of vulnerabilities, including critical RCE vulnerability that might be exploited by malicious actors in order to perform remote code execution without authentication. The Critical Vulnerability CVE-2023-33299 (CVSS score: 9.6, Critical) – A deserialization of untrusted data vulnerability, successful exploitation may allow an unauthenticated user to…
-
Threat Intelligence
ISC Patches BIND9 DNS Software Vulnerabilities
June 22, 2023 The Internet Systems Consortium (ISC) has published patches to address various security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that might lead to a denial-of-service (DoS). The Vulnerabilities CVE-2023-2911 CVE-2023-2829 CVE-2023-2828 Affected Versions BIND: 9.16.33 -> 9.16.41 9.18.7 -> 9.18.15 BIND Supported Preview Edition…
-
Threat Intelligence
Apple Patches 3 Zero-Day Vulnerabilities affect Variety of Products
June 22, 2023 Apple published security upgrades to address three RCE zero-day vulnerabilities that were discovered to be exploited in the wild. The Vulnerabilities CVE-2023-32434 – An integer overflow vulnerability in the Kernel that could be exploited by a malicious app to execute arbitrary code with kernel privileges. CVE-2023-32435 – A memory corruption vulnerability in…