Resources

Learn about CYREBRO’s platform, technology, and capabilities, read about industry insights, watch webinars with cyber experts, and much more in the resources below.

  • Google Chrome 0-Day Vulnerability Exploited in the Wild
    Threat Intelligence

    Google Chrome 0-Day Vulnerability Exploited in the Wild

    Google has released an emergency update for Chrome, addressing an actively exploited Zero-Day, as well as 4 additional vulnerabilities.

  • New Log4j Patch, Vendors Release Security Advisories
    Threat Intelligence

    New Log4j Patch, Vendors Release Security Advisories

    Last published on: December 15, 2021 New Log4j Vulnerability – Patch Available Apache has released a new patch for the Log4j, addressing a new vulnerability discovered, tracked as CVE-2021-45046 (CVSS 3.0 score 3.7), that may allow threat actors to cause Denial-of-Service (DoS) attacks in certain scenarios. According to Apache, this vulnerability is not patched in…

  • The 6 Critical Capabilities of a Complete SOC Solution
    Guides & E-books

    The 6 Critical Capabilities of a Complete SOC Solution

    A SOC solution is an ideal way for businesses to maintain proper protection and response against cyberattacks, especially before they occur.

  • 7 Steps to Effective Incident Response
    Guides & E-books

    7 Steps to Effective Incident Response

    This guide is meant to help you take the first steps to creating an effective incident response plan. Every organization is different, so use this guide as a framework to create an incident response plan (IRP) that is uniquely tailored to your organization.  

  • GoDaddy Data Breach Affects 1.2M Costumers
    Threat Intelligence

    GoDaddy Data Breach Affects 1.2M Costumers

    GoDaddy, the web-hosting giant, has disclosed it has suffered from a data breach. The attackers have gained access to GoDaddy’s Managed WordPress hosting environment. Although the breach was discovered on November 17, according to GoDaddy’s investigation the attackers have infiltrated the systems on September 6. The attackers have gained access to the following information: Up…

  • Predictions for 2022
    Guide

    Predictions for 2022

    Cybersecurity should be considered a right, not a privilege. As such, investment into solutions that can transform chaos into clarity, as well as improving employee awareness, will be critical when facing threats into 2022 and beyond