Profero

Profero

计算机和网络安全

Specialized Cyber Security Problem Solvers

关于我们

Profero https://www.dhirubhai.net/in/omrimoyal

网站
https://profero.io
所属行业
计算机和网络安全
规模
11-50 人
类型
个体经营
创立
2019
领域
cybersecurity、Incident Response和Entrepreneurship

Profero员工

动态

  • 查看Profero的公司主页,图片

    1,158 位关注者

    We're thrilled to share insights from our Co-founder and CTO, ???? ???? Guy Barnhart-Magen, who recently delivered an impactful talk at the T2 Infosec Conference. His presentation delved into some of the most pressing challenges and innovations within the cybersecurity landscape. Check out Guy's post to gain valuable perspectives and stay updated with the latest trends in the field. #Profero #Cybersecurity #T2Infosec #Innovation #Leadership

    查看???? ???? Guy Barnhart-Magen的档案,图片

    Co-founder and CTO at Profero | BSidesTLV Chairman | Board Member | Public Speaker

    A few days ago, a talk I gave at t2 infosec conference last year surfaced online. Many thanks to the organizers for letting me share my day-to-day experience as a professional incident responder and explain why I think that, by and large, IR is utterly broken. It's an hour-long talk (link in the first response), so I'll try to give you just the bulleted version: * Resources gap - Large organizations have the budget, and they can go to large IR companies and get help when they need it. Demand and supply. But small companies - SMBs and SMEs - have tight budgets, therefore almost no one to turn to (And sure enough, they are in need more and more often). * Expertise gap - Most of the time IR is done by consultants. They are usually not very technical, and they sell IR alongside PT services, compliance services, and more. But almost no one specializes in IR. * Time frame problem - In IR there are bottlenecks everywhere. It usually takes between 12 to 36 hours to engage a company if they don't have a pre-existing arrangement with an IR provider. Then, it usually takes between 1 to 3 days to actually get access to the systems (!). All in all, a successful incident takes weeks to months just to start the remediation phase (Graph attached). Slow response to incidents is a real problem. * Incentives gap - One of the most important aspects that shapes this market is that consultants (like lawyers) bill by the hour, so they are incentivized to stretch out engagements for as long as possible while bleeding the customer. It is a predatory practice. The title of my talk was "Closing the Gap." Profero was established 5 years ago (birthday approaching) with all of those gaps in mind. We are solving those gaps with a recurring SaaS business model, a preemptive readiness approach, and ongoing assessments. It is like having all the fire extinguishing equipment in place, knowing the firefighters by name, and running joint drills. This has proved itself numerous times as a healthy approach to prevent cyber incidents in the first place or dramatically reduce the mean time to recover. Most importantly, it gives our customers peace of mind.

    • 该图片无替代文字
  • 查看Profero的公司主页,图片

    1,158 位关注者

    Come meet our team at BlackHat London! ??♂? Join us to discover how your organization can become breach-ready and stay ahead of cyber threats.Don't miss the opportunity to meet with our experts and learn how to fortify your cybersecurity defenses. Book a meeting with us today to discuss your unique needs and challenges: https://lnkd.in/dbg9Yq8z

    • 该图片无替代文字
  • 查看Profero的公司主页,图片

    1,158 位关注者

    Our CEO and Co-Founder, Omri Segev Moyal highlights the rising threat of Infostealers on his last post. Don't miss out on his practical tips to strengthen your defenses!

    查看Omri Segev Moyal的档案,图片

    | CEO @ Profero | I used to take things apart, now I build them | Forbes 30 under 30.

    Infostealer - A Threat on the Rise: Last year, an employee of the Israeli National Cyber Directorate?learned a harsh lesson. His private workstation was mysteriously infected, and his details leaked to the internet, including screenshots of his desktop and other details. The researcher was hit by "Stealer malware" (aka Infostealer) called Redline. This is THE most trending kind of malware currently – even more prevalent than ransomware – so allow me to elaborate: Stealer malware is designed to steal information from a PC. The attack vectors are numerous – including phishing, software bundles, browser plugins, and more. Once the victim downloads the rogue software, the virus steals all sorts of data: browser cookies, passwords, crypto wallets, files, and more. As the software doesn't need to encrypt files, the attack fingerprint is minimal, and the malware is hard to detect. According to Specops, hundreds of millions of passwords have already leaked online, and it is estimated that millions of devices are infected worldwide. The journey of the stolen files is fascinating. First-hand – the OGs – they skim the cream after evaluating the data and gain access to large wallets, lucrative bank accounts, etc. They then sell the dump with all the data on the dark web or Telegram. The buyers are usually cybercriminals who use this bulk of stolen usernames and passwords to gain access to organizations' networks (this practice is called Credential Stuffing). This is how Uber was breached. We're not done yet because eventually, the data typically leaks onto the web, where strategic players lurk for diamonds. This is presumably how the details of the Israeli gov employee got out. The data changes hands and is exploited multiple times; you've got to admire the scavenging. Two weeks ago, law enforcement agencies from 6 countries managed to take down the infrastructure of Redline – the most notorious stealer malware gang. This is great news, but you know, there is no checkmate in cyber defense. The game is on. So, what can individuals and organizations do to avoid stealer malware? ? It is wise to protect employees' personal assets as well – as they are the weakest link in the network. However, privacy issues must be considered. ? Strict access management is critical, under Zero-Trust assumptions. No BOYD should be allowed in. ? Two-factor authentication across all sensitive assets is always wise, also as protection for this kind of attack. ·?????Make sure SSO is implemented in every SaaS and on-prem. ·?????Avoid dual users accounts in any cost, leave no generic users such as “support” or similar used by multiple people and teams. ·?????Make sure to implemented credential breach monitoring. If you have any thoughts or battle-earned experience with this kind of threat – you're invited to comment and share your knowledge for the benefit of all parties. Be Breach Ready!

  • 查看Profero的公司主页,图片

    1,158 位关注者

    Join us as our co-founder and CTO, ???? ???? Guy Barnhart-Magen, will speak at the 'Executive Responsibility in Cyber Crisis Management' conference hosted by EBN - Erdinast. Ben Nathan. Toledano. Don't miss this opportunity to learn from industry experts about the latest trends and strategies in handling cyber crises. Secure your spot now- https://lnkd.in/dTTggP6S

    ??? ??????: ?????? ????? ???? ?????? ?????? ??????? ????? ? ??????? ?????? ????? ?????? ????? ?????, ??????? ????????? ?????? ???? ?????? ???????? ?????? ?? ?????? ???? ????????? ?? ?????? ????. ??? ??????? ???? ???? ???? ?? ????? ?????? ??????? ????? ???? ??????? ???????? ????????? ?? ????? ??????? ???. ???? ?????, ??? ????, ??????? ???????? ?????: ?? ?????? ?????? ??? ????? – ????? ????? ??????? ????? ???? ????? ????, ??? ??? ?? ?????? ?????. ?? ??????? ???????? – ????? ????? ??????? – ????? ??????????? ???? ?????? ????. ?? ??????? ??????? ????? ?????? ??????? ????? – ???? ????? ?????? ????? ????????? ?? ?????? ?????????? ?????? ?? ??????? ????????. ??????? ?????? ???? ??? – ?????, ??????? ????, ??????? ????? ????? ???????? ????? ?? ???? ??????? ????? ?? ????? ??????. ? ?????? ?????? ?????? >> https://lnkd.in/dTTggP6S Ran Sprinzak | Naama Ehrlich | Arik Brenneisen | Lior Etgar | Hadas Bekel | ???? ???? Guy Barnhart-Magen | Peter Teishev | Hadar Zofiof (gridish) | ACC Israel | IDU Israel Directors Union

    • 该图片无替代文字
  • 查看Profero的公司主页,图片

    1,158 位关注者

    Wishing a safe and sweet Rosh Hashanah to everyone celebrating, no matter where you are. May your new year be filled with security, prosperity, joy, and hope. We extend our deepest wishes for the safe release of all hostages. ??

    • 该图片无替代文字
  • 查看Profero的公司主页,图片

    1,158 位关注者

    ?? Profero is hiring! Passionate about cyber security and seeking a new adventure? We have two key positions open: ??? Go Backend Developer ?? Incident Response Specialist Visit our Career page to find out all the requirements and benefits of working at Profero. Here, you won't just be part of a team—you'll be part of our mission for breach readiness revolution. Ready to take the leap? Send us your CV and be a part of the future of cyber security! ?https://profero.io/careers

    • 该图片无替代文字
  • 查看Profero的公司主页,图片

    1,158 位关注者

    A single secret leak in your source code can open doors to a cyber catastrophe. Enhance your breach readiness by reinforcing your code with our latest advanced practices and incident response techniques. Don't miss out on crucial insights, read our new blog post for fortified security measures. https://lnkd.in/dWskBrvY

    • 该图片无替代文字

相似主页

查看职位