cyberproofinc Profile Banner
CyberProof Profile
CyberProof

@cyberproofinc

Followers
378
Following
227
Media
2K
Statuses
2K

CyberProof delivers AI-powered, cloud-first security operations, providing industry-leading services to drive real business results. Better security, together.

Aliso Viejo
Joined April 2018
Don't wanna be here? Send us removal request.
@cyberproofinc
CyberProof
11 hours
Many security operations centers (SOCs) often get stuck in reaction mode—unable to plan ahead or anticipate evolving threats. 🔍 As Nethaniel Ribco, CyberProof’s CTI Team Leader, says, having a SOC without cyber threat intelligence (CTI) is like driving while only looking
0
0
0
@cyberproofinc
CyberProof
14 hours
🚨 Iranian threat actors are using AI-generated emails to target #cybersecurity researchers and academics. CyberProof says, even though no major destructive attacks have been publicly attributed recently, these pose latent threats for sabotage. Details at @gbhackers_news:
Tweet media one
0
0
0
@cyberproofinc
CyberProof
17 hours
Security operations are at a turning point. #AgenticAI is what’s next. We’re taking #AI beyond automation and deploying intelligent AI agents where it makes the biggest impact, delivering:. ➡️ Lower operational costs.➡️ Faster detection and response (MTTD & MTTR).➡️ Reduced
0
0
0
@cyberproofinc
CyberProof
2 days
AI is reshaping cybersecurity—and not without risks of its own. Yuval Wollman's latest piece for @TheAIJournal1 explores the dual challenge of AI in cyber: how it empowers defenders and attackers alike, and how shifting to a threat-led strategy can help security teams stay ahead.
0
1
1
@cyberproofinc
CyberProof
2 days
This is an update from our initial research on the ConnectWise ScreenConnect attacks. Catch up on part 1 here:
0
0
0
@cyberproofinc
CyberProof
2 days
🔓 In the latest wave of attacks exploiting ConnectWise ScreenConnect, threat actors are using IRS-themed phishing lures to deploy backdoors and steal sensitive data. Get the details on the latest tactics and indicators to watch for: #ThreatIntel
Tweet media one
1
0
0
@cyberproofinc
CyberProof
2 days
💡 Curious about how #AI is being used to evolve security operations?. In this episode of #CyberSentries, our Doron Davidson shares how AI is pushing SOC maturity models to new levels. Beyond traditional AI integration, he explains how agentic models are enabling enhanced threat
Tweet media one
0
0
0
@cyberproofinc
CyberProof
3 days
RT @MITSMRIndia: .@cyberproofinc, part of #UST, delivers end-to-end security with AI-powered automation and managed services. Swipe to read….
0
2
0
@cyberproofinc
CyberProof
3 days
🚀 Build a Continuous Threat Exposure Management (CTEM) program from the ground up. 📆 Join us tomorrow, July 16, for the next episode in the CyberProof Security Series, where experts Nick Lantuh and Brendon Anderson will dive into the why, what, and how of CTEM implementation
0
0
0
@cyberproofinc
CyberProof
4 days
🎩 We’re headed to Black Hat 2025, and we want to see you there!. Let’s talk about:.✔️ Leveraging AI-powered analytics and automation in managed detection and response (MDR).✔️ Closing visibility gaps.✔️ Operationalizing a Continuous Threat Exposure Management program. Then
0
0
0
@cyberproofinc
CyberProof
7 days
🎧 Familiar with the #CyberSentries podcast? We’re thrilled to be hosting Season 2 here at CyberProof!. Cyber Sentries dives deep into AI’s growing role in securing cloud environments—exploring where innovation meets constant vigilance in today’s evolving threat landscape. If
Tweet media one
0
0
0
@cyberproofinc
CyberProof
7 days
It was great to be part of the Securing Financial Services Summit in London last week!. Our Matt Baird took the stage to share how to successfully implement a Continuous Threat Exposure Management (CTEM) program—and why it’s more relevant than ever for the financial sector. 🔑
Tweet media one
0
0
0
@cyberproofinc
CyberProof
8 days
A recently disclosed vulnerability, CVE-2025-49144, turns this everyday Windows tool into a privilege escalation vector. 🔍 Explore this breakdown of how it works and what you can do to detect and defend against it. Read more ➡️ #ThreatResearch
Tweet media one
0
0
0
@cyberproofinc
CyberProof
8 days
🔍 Join us next week for the next episode of the CyberProof Security Series! We’re diving into tailored cyber threat intelligence (CTI) and how we create profiles unique to each customer's digital ecosystem. Discover how mapping intel to your specific risk profile helps
0
0
0
@cyberproofinc
CyberProof
10 days
⚡ Threats are evolving—fast. In today’s dynamic threat landscape, managed threat intelligence helps you:. ✔️ Leverage #AI and automation to prioritize and focus on only relevant risks.✔️ Potentially streamline costs associated with hiring, training, and maintaining a team.✔️
0
0
1
@cyberproofinc
CyberProof
11 days
🕷️ In this @SCMagazine article, CyberProof President Yuval Wollman breaks down three critical ways to combat adversaries like Scattered Spider:. ➡️ Go threat-led: A threat-led strategy should include asset management, exposure management, and defense management. ➡️ Use trusted.
0
4
4
@cyberproofinc
CyberProof
11 days
Here's why your Configuration Management Database (CMDB) isn't working for you 👇. ➡️ Provides a static view of assets with no security-relevant context.➡️ No prioritization based on actual business risk.➡️ Lacks actionable insights for a proactive defense. Bottomline: a CMDB
0
0
0
@cyberproofinc
CyberProof
15 days
From CISO to CEO, our @TonyVelleca has seen #cybersecurity from both sides of the table. He understands firsthand the mounting pressures security leaders face: evolving threats, compliance, and the constant chase for a “single pane of glass” that never quite delivers. In this
0
0
0
@cyberproofinc
CyberProof
15 days
RT @SCMagazine: In this commentary, @cyberproofinc's Yuval Wollman recommends a multi-layered plan security teams can take to protect thems….
0
1
0