In recent days, a fake version of Salesforce has been exploited to carry out a particularly sophisticated vishing attack. Cybercriminals, posing as internal operators or company technicians, contacted victims by phone with the aim of…
Tech Blog
CERT Posts
In recent years, the use of tools known as sandboxes has grown significantly. These platforms offer a secure, isolated environment in which suspicious files, emails and potentially harmful links can be examined without risking compromise…
The Chinese-linked APT group UNC5174 has been observed deploying an advanced malware toolkit targeting Linux systems, combining a custom downloader known as SNOWLIGHT with a stealthy and powerful remote access trojan called VShell. What…
In recent times, the “E-crime as a service” phenomenon has radically changed the cybercrime landscape, opening the door to “low-skill” criminals. Thanks to an increasingly accessible ecosystem and the availability of turnkey criminal tools, today…
Since 2024, a new cybercriminal group has been targeting various companies with sophisticated and evasive techniques. Our Incident Response team has intervened several times to neutralise it, and in this article we provide an analysis…
The dark web hosts a complex ecosystem where licit and illicit activities intertwine, offering anonymity but also exposing to significant risks. The main communication between criminal hackers takes place in specialised forums that serve as…
We often hear about BEC, an acronym that stands for Business Email Compromise, a threat we all face every day in our mailbox. But in fact, what are we talking about? How to avoid falling…
In recent days, DeepSeek, a new artificial intelligence model of Chinese origin, has rapidly gained popularity and sparked discussions both economically and in terms of cybersecurity. On one hand, many observers note how DeepSeek has…
For a long time, the main mode of software development has globally rested on the concept of ‘as long as it works’, and most applications (particularly web applications) developed over the last two decades have…
On 19 December 2024 at 00:03 UTC, ransomware group LockBit announced the release of LockBit 4.0 on its leak site (DLS). Known for its aggressive tactics and frequent updates, LockBit introduces an even more advanced…
Tech Updates
Network Intrusion Detection Systems (NIDS) are fundamental tools in contemporary computer security, designed to identify malicious activity and security policy violations through continuous monitoring of network traffic. The primary objective of a NIDS is to…
In the cybersecurity landscape, the focus has often been on identifying threats, which is crucial but not sufficient to ensure a comprehensive defence. The Cyberoo team has observed a growing need to improve remediation management,…
In recent months CYBEROO has launched Cypeer Agent X: an advanced agent designed to enhance the Cypeer MDR (Managed Detection and Response) with an in-depth analysis of the company’s security posture. In this article, we…
In recent months, we have released a new module for the MDR Cypeer: CypeerPOT. This new functionality further enriches the capabilities of our Managed Detection and Response (MDR), offering an advanced way to identify ongoing…
Realized a new Dashboard for immediate horizontal correlation of alerts The introduction of the new alert management dashboard represents a significant step forward in the way companies monitor and manage internal security. In fact, this…
CSI (Cyber Security Intelligence) is CYBEROO’s Threat Intelligence service, based on Open Source Intelligence. Its goal is to detect, collect and analyze sensitive information and data found in the Deep and Dark Web to protect…
CYBEROO’s continuous investment in R&D has made possible the release of important updates to the Cypeer module, with the implementation of advanced Adaptive AI and Machine Learning technologies that enable improved analysis and stronger security…
Incident Response Reports
In the world of cybersecurity, incident response is a crucial process that requires precision and expertise. A significant example of an effective intervention by Cyberoo Incident Response Team is the case of a well-known consultancy…
Infostealers: silent thieves in the digital world Infostealers are a particularly insidious type of malware, designed to steal personal and sensitive information stealthily and often unnoticed. These malicious programmes operate in the background, collecting data…
Knowing how to read a log and recognizing a behavioral anomaly, especially on non-working days and times, will inevitably reduce the risk of impairment. Recently, Cyberoo’s Incident Response team was engaged after a total Ransomware…
We often talk about data protection and how to protect against exfiltration as malware and ransomware attacks of different types continue to proliferate. Nevertheless, the reality is that companies are still doing too little. Cyberoo’s…
The statistics speak for themselves: the increase in ransomware attacks turns out to be across different organizations, regardless of their industry. This phenomenon can be attributed to several factors, including lack of adequate investment in…
It often happens to work with companies that have signed contracts with ICT service providers that turn out to be inefficient when needed. In today’s business environment, Cybersecurity management must be configured as a multidimensional…
It is common to have to deal with IT incidents and be faced with undesirable situations, not because of the type or severity of the incident, but rather because of the lack of organization of…
Recently, a company in northern Italy was victim of a serious cyber attack that resulted in the compromise of its infrastructure and the interruption of operations. The perpetrators of the malicious attack gained unauthorized access…