DATA SECURITY

CyberHat secures $15 million in funding to expand its CYREBRO Enterprise-Level Cybersecurity Protection to Small and Medium-Sized Businesses

CYREBRO | April 22, 2021

CyberHat secures $15 million in funding to expand its CYREBRO Enterprise-Level Cybersecurity Protection to Small and Medium-Sized Businesses
CYREBRO, the one-of-a-kind SOC as a stage arrangement by CyberHat declared today it has gotten $15 million in Series B financing, driven by Prytek, with support from InCapital, Mizrahi Bank, and past financial backer, Mangrove. This brings the complete organization subsidizing raised to date to $22M.

Upheld by a group of digital specialists, CYREBRO is democratizing admittance to best-of-breed network safety assets, changing how organizations today run their security tasks to rapidly react to and relieve digital dangers. CYREBRO is the principal innovation freethinker cloud-based security tasks focus (SOC) that is spearheading the SOC-as-a-Platform model. CYREBRO applies extensive endeavor level information security to associations against new dangers that have emerged from the distant workplace, including under-resourced private companies that have become ideal objectives for digital assaults.

The new subsidies will be utilized to extend CYREBRO's SOC-as-a-Platform to fulfill the detonating need for vigorous, versatile, straightforward, and basic security activities arrangements. Bringing to bear aptitude and conveying bespoke answers for undertakings across businesses, the subsidizing will speed up carry out of its contribution to the little to-medium estimated (SMB) market, separating hindrances to getting to fundamental network protection arrangements beforehand unattainable to the SMB client. Ludicrous year alone more than 47% of independent companies have encountered an information break or digital assault, and these occurrences can cut down a whole organization.

CYREBRO empowers organizations to unify online activities of the whole security stack, putting the force of big business grade SOC into the moderateness and adaptability of cloud-based assistance.

"CYREBRO is the subsequent stage in the advancement of working network safety and we are pleased to pioneer the SOC as a staged market," clarified Nadav Arbel, CEO of CyberHat. "Getting this round with our new and existing financial backers will empower us to speed up the improvement of CYREBRO and reinforce our range in the SMB market. We have made it our central goal to empower 1st-grade security tasks for associations of any size and any innovation stack, and all things considered, we are exceptionally eager to see the colossal development in CYREBRO customers across the globe."

CYREBRO's SOC stage is upheld by a group of cutting-edge digital examiners and measurable agents good to go, 24x7. The stage coordinates with any current security frameworks, devices, and programming, including all cloud-based stages and interior organization gadgets. CYREBRO offers a "turnkey" answer for SOC necessities, including the SIEM innovation (whenever required), danger chasing, danger insight, full-level investigators, analytical capacities, and a top notch IR accessible as needs are. Many universally settled organizations have effectively picked CYREBRO as their digital tasks stage to safeguard against information penetrates and assaults. This incorporates SMBs just as a basic foundation and enterprises like clubs, worldwide retailers, banks, insurance agencies, and other Fortune 500 organizations. Presently every SMB will approach these equivalent undertaking apparatuses and digital assurance assets.

"Prytek bunch, through our corporate endeavor arm, is eager to put resources into CyberHat. Cyberhat's answer will provide for our oversaw administrations to arm extra SOC capacities per request," said Arnon Shiboleth, Prytek Co-CEO. "We anticipate cooperating with the group as they keep on growing the innovation into new business sectors to satisfy the worldwide need."

About CYREBRO

CYREBRO was established in 2013 by CyberHat to help organizations take digital security to new and exceptional statures. Today, our central goal is to change network safety tasks by putting the force of an undeniable Security Operations Center (SOC) in the possession of any client in any association. Our group of head network protection specialists has built up the business' first on the web, innovation freethinker SOC-as-a-Platform. From vital observing to proactive danger chasing, sped up episode reaction, and upgraded consistency, we cover the full extent of safety needs.

About Prytek

Prytek imagined a news idea of a Business Operating Platform as a Service permitting banks to rethink whole activities. Prytek works in training, monetary help, digital and HR areas.

Spotlight

DDoS cyber attacks continuously flood your server and firewall with thousands of fake requests until the volume of requests causes the server to fail, and your site to go offline. DDoS attacks are becoming increasingly common and it is vital that your organisation has measures in place to mitigate the impact on your business’ continuity.

Related News

Cybersecurity Comes under Scanner as Google Chrome Users Hit by Spyware Campaign

Google | June 19, 2020

A newly discovered spyware effort attacked users through 32-million downloads of extensions to Google’s market-leading Chrome web browser. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools. The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains. A newly discovered spyware effort attacked users through 32-million downloads of extensions to Google’s market-leading Chrome web browser, researchers at Awake Security said, highlighting the tech industry’s failure to protect browsers as they are used more for e-mail, payroll and other sensitive functions. Alphabet’s Google said it removed more than 70 of the malicious add-ons from its official Chrome Web Store after being alerted by the researchers in May. When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses, Google spokesperson Scott Westover said. Most of the free extensions purported to warn users about questionable websites or convert files from one format to another. Instead, they siphoned off browsing history and data that provided credentials for access to internal business tools. Read more: 65% OF PHISHING THREATS FACING REMOTE WORKERS IMPERSONATE GOOGLE-BRANDED WEBSITES When we are alerted of extensions in the Web Store that violate our policies, we take action and use those incidents as training material to improve our automated and manual analyses. ~ Google spokesperson Scott Westover said Based on the number of downloads, it was the most far-reaching malicious Chrome store campaign to date, said Awake co-founder and chief scientist Gary Golomb. Google declined to discuss how the latest spyware compared with prior campaigns, the breadth of the damage, or why it did not detect and remove the bad extensions on its own despite past promises to supervise offerings more closely. It is unclear who was behind the effort to distribute the malware. Awake said the developers supplied fake contact information when they submitted the extensions to Google.“Anything that gets you into somebody’s browser or e-mail or other sensitive areas would be a target for national espionage as well as organised crime,” said former National Security Agency engineer Ben Johnson, who founded security companies Carbon Black and Obsidian Security. We do regular sweeps to find extensions using similar techniques, code and behaviours,” Google’s Westover said, in identical language to what Google gave out after Duo’s report. The extensions were designed to avoid detection by antivirus companies or security software that evaluates the reputations of web domains, Golomb said. If someone used the browser to surf the web on a home computer, it would connect to a series of websites and transmit information, the researchers found. Anyone using a corporate network, which would include security services, would not transmit the sensitive information or even reach the malicious versions of the websites. All of the domains in question, more than 15,000 linked to each other in total, were bought from a small registrar in Israel, Galcomm, known formally as CommuniGal Communication. In an e-mail exchange, Galcomm owner Moshe Fogel told Reuters his company had done nothing wrong. “Galcomm is not involved, and not in complicity with any malicious activity whatsoever,” Fogel wrote. “You can say exactly the opposite, we co-operate with law enforcement and security bodies to prevent as much as we can.” Fogel said there was no record of the inquiries Golomb said he made in April and again in May to the company’s e-mail address for reporting abusive behaviour, and he asked for a list of suspect domains. Reuters sent him that list three times without getting a substantive response. The Internet Corp for Assigned Names and Numbers, which oversees registrars, said it had received few complaints about Galcomm over the years, and none about malware. Read more: LEVERAGING THREAT INTELLIGENCE TO TACKLE CYBERTHREATS IN TIMES OF COVID-19

Read More

Hackers Are Using Google Analytics to Steal Your Credit Card Information

Search Engine Journal | June 29, 2020

Hackers are using Google Analytics to steal credit cards, passwords, IP addresses... basically everything shared with a hacked site.An investigation by Kaspersky Lab has uncovered a new hacking technique that uses Google Analytics to steal credit card numbers, user agents, IP addresses, passwords… basically everything.This isn’t an exploit in Google Analytics itself.Hackers are exploiting the trusted status given to Google Analytics by all browsers in order to steal information from hacked sites by using Google Analytics as a way to transfer that data.Kaspersky’s report noted that the exploit is stealing everything that is shared with the affected website, including credit card information but presumably that means password information as well.The exploit apparently steals “everything” from passwords, name and address, credit cards and even the personal information of the person sharing their information.

Read More

DATA SECURITY

Cylitic Security Chooses Swimlane to Deliver Enterprise-Grade Security Automation Services at Scale

Cylitic Security | November 15, 2021

Cylitic Security, a cyber security services provider, announced that it has chosen Swimlane, the leader in cloud-scale low-code security automation, to scale up its security operations. Cylitic is pioneering a comprehensive managed security service to help small to medium-sized businesses successfully fight off sophisticated cyberattacks. On average, Fortune 100 companies spend hundreds of millions of dollars annually on dedicated professional cybersecurity analysts, complicated tools, and technologies to continuously monitor their networks looking for anomalies and act in real-time to mitigate threats. Unfortunately, these capabilities are not always realistic for smaller entities. Security talent is expensive and sparse. Some cybersecurity technology vendors won't sell to smaller entities, which is also a disadvantage. Yet, cybersecurity is not a concern only prevalent amongst large-scale enterprises--nor are the associated challenges with keeping an organization secure. Cybersecurity is an industry-wide concern for businesses of all shapes and sizes. Deploying security automation systems can bring the sophistication of enterprise-scale systems to the SMB customer. Low-code security automation provides a robust application development capability for use cases that can be solved with simple drag-and-drop data entry and business logic to extremely complex, sophisticated solutions that meet the needs of the entire organization. Cylitic's purpose is to bring advanced security capabilities and expertise to small to medium-sized customers who normally otherwise wouldn't have this access. Cylitic is leveling the playing field against threat adversaries who specifically target smaller organizations. "We are excited to be partnering with Swimlane. Their platform allows us to scale our security service even further and helps us protect tens of thousands of mission-critical systems for smaller organizations. Technology like Swimlane is common in large, sophisticated Fortune ranked companies and Government agencies. This is yet another piece of the puzzle for Cylitic to democratize the state of technology and tactics for smaller organizations that don't have experienced cybersecurity teams," said Andrew Thornton, Cylitic Security's Chief Security Officer. "Today, every company is a technology company,Moreover, every company is experiencing the impacts of a global talent shortage, and simultaneously, security is having an unprecedented impact on businesses and their bottom line, making cybersecurity a company-wide issue. Together, Swimlane and Cylitic are bringing the power of the low-code security automation to the SMB market, providing a customer-first approach by combining security technology integrations with industry best practices to create market-ready solutions that accelerate time-to-value." Cody Cornell, co-founder, and chief strategy officer, Swimlane About Swimlane Swimlane is the leader in cloud-scale, low-code security automation. Supporting use cases beyond SOAR, Swimlane improves the ease with which security teams can overcome process and data fatigue, as well as chronic staffing shortages. Swimlane unlocks the potential of automation beyond the SOC by delivering a low-code platform that serves as the system of record for the entire security organization and enables anyone within the organization to contribute their knowledge and expertise to the protection of the organization. About Cylitic Cylitic Security provides cyber security technology and services. Collectively the Cylitic team has defended global Fortune companies and critical government systems. Cylitic combines best in class Silicon Valley engineering with exceptional security talent to create the next generation of managed security services. Cylitic's people + technology work synergistically to protect their customers around the clock. The Cylitic team is particularly proud to apply their skills and tools to help protect small mission critical companies.

Read More

Spotlight

DDoS cyber attacks continuously flood your server and firewall with thousands of fake requests until the volume of requests causes the server to fail, and your site to go offline. DDoS attacks are becoming increasingly common and it is vital that your organisation has measures in place to mitigate the impact on your business’ continuity.