SecOps & Risk mitigation
CyberProof uses OSINT and threat intelligence feeds for visibility into threats.
CyberProof’s adaptable playbooks address continuously evolving threats with updated strategies.
Professionals manage sophisticated networks, leveraging experience to counter advanced threats.
Professionals manage sophisticated networks, leveraging experience to counter advanced threats.
24/7 global SOC support ensures incident response with guaranteed SLA.
24/7 global SOC support ensures incident response with guaranteed SLA.
CyberProof develops recovery plans, restoring capabilities after a cyber incident.
Classify and manage enterprise assets, understanding risks and data sensitivity.
Non-destructive tests uncover potential exploits in assets and applications.
Mitigate security issues early with CyberProof’s training and awareness programs.
Rigorous security assessment for on-premise and cloud applications to ensure protection.
IAM manages user access, monitors for anomalies, ensuring security.
Cloud First approach ensures compliance and security within cloud environments.
Managed service for SIEM, EDR, MXDR, and threat intelligence solutions.
Identify, assess, and mitigate security vulnerabilities through regular scanning.
Partners
See all partners“Today I have complete visibility into the entire environment, in real time”
Jamil Farshchi | Equifax CISO
CyberProof CTEM
CyberProof’s CTEM platform, powered by Interpres, is able to continuously identify, assess, and prioritize risk, while enhancing defense services like MDR, Vulnerability Management and Use Case Management to address evolving threats. Take proactive steps to fortify your security today!
Threat Alerts
Fortinet Patches Critical Zero-Day Vulnerability Exploited in the Wild (CVE-2025-32756)
Fortinet has released security updates addressing a critical vulnerability (CVE-2025-32756) that has been actively exploited as a zero-day in attacks targeting FortiVoice enterprise phone systems. The flaw, which carries a CVSS score of 9.6, is a stack-based buffer overflow (CWE-121) that could allow remote unauthenticated attackers to execute arbitrary code or commands via specially crafted HTTP requests.
According to Fortinet’s advisory, the vulnerability impacts multiple products including FortiVoice, FortiMail, FortiNDR, FortiRecorder, and FortiCamera. While the company confirmed active exploitation on FortiVoice systems, it did not disclose the scale or attribution of the attacks.
Attackers reportedly conducted network scans, enabled FCGI debugging to capture credentials, and erased system crash logs to cover their tracks. The vulnerability affects multiple Fortinet products, and users are urged to take necessary action.
Scattered Spider Hackers Shift Focus to U.S. Retail Sector
Researchers have warned that hackers using Scattered Spider tactics, who recently attacked UK retail chains including Marks & Spencer, Co-op, and potentially Harrods, have now expanded their operations to target US retailers. The threat actors, also tracked as UNC3944, 0ktapus, Scatter Swine, Starfraud, and Muddled Libra, are employing ransomware and extortion operations against the retail sector, continuing their pattern of focusing on one industry at a time. These attackers are known for sophisticated social engineering techniques including phishing, SIM swapping, and MFA bombing, and have previously compromised high-profile organizations such as MGM Resorts, Twilio, Coinbase, and Reddit. The DragonForce ransomware operation, which emerged in December 2023 and has claimed responsibility for the UK retail attacks, appears to be the latest ransomware variant utilized by this fluid collective of threat actors who have previously affiliated with RansomHub, Qilin, and BlackCat ransomware operations.