Services

How can we help you?

Cyber80 provides the following services:

Business Email Compromise (BEC)

Have you or a company that you are doing business with received an email with fraudulent wire-transfer instructions? If so, there is a high probability that an attacker has compromised your company’s email.

Cyber80 can perform email forensics on your email tenant and determine the following:

1. Is your email tenant compromised?
2. How many users are compromised?
3. When and how did the compromise occur?
4. What IP addresses were responsible for the attack?
5. What data was compromised or exfiltrated in your email or storage (ie SharePoint)
6. Is the attacker still in your tenant, and if so, let’s get them out!
7. What best practices should you employ going forward?

There may be other considerations as well. Please contact us to discuss further.

Note: the investigation applies to Microsoft 365 and Google Workspace only. Other emails such as Yahoo, AOL, GoDaddy, etc, have very little logging, which makes forensics essentially useless.

Ransomware Investigations

If you are reading this, then you may have come to work and discovered that all of your important files have changed their file extensions and will no longer open!  Ransomware attacks, like this, are very complex and required skilled forensics to determine the following:

  1. When did the breach start and what was the root cause?  The initial attack usually occurs weeks or MONTHS before the final encryption event. 
  2. Can any data be recovered?
  3. What data was exfiltrated by the attacker? 
  4. Did any of your existing security appliances fail to detect the attack, and if so, how can this be fixed?
  5. How many endpoints and servers were affected?

Cyber80 will perform a comprehensive examination of your entire network, to include firewalls, VPNs, EDR/SIEM/XDR, servers and endpoints to gather a complete understanding of how the attack occurred and how to prevent it in the future.

Cyber80 will work together with your IT team, Remediation team, law firm and negotiation team to help you get up and running as soon as possible.

Contact us for more details, as all cases are unique.

Cloud Investigations

Has your bill for your cloud account SKYROCKETED recently?  There is a good chance that an attacker has gained access to your cloud account and is now using it for nefarious means and which has jacked up your costs exponentially.

Cyber80 can forensically examine your Amazon Web Services (AWS) or Microsoft Azure cloud account to determine the following:

  1. When did the breach occur and how did the attacker gain access?
  2. What was the extent of the breach?
  3. What services did the attacker use after gaining unauthorized access?
  4. Was any sensitive data accessed in your cloud storage?

Other types of cloud scenarios can also arise, from stolen secret keys to IAM or Root user compromises. Contact Cyber80 for further details so we can help you get back on track!

Cyber Presentations

Our team delivers engaging and insightful cybersecurity presentations tailored for small or large businesses. We cover critical topics like emerging threats, incident response best practices, and strategies to safeguard your organization against cyberattacks. Empower your team with the knowledge to stay ahead in today’s evolving threat landscape.

Cyber Assessments

We offer comprehensive cybersecurity assessments for email systems and networks to identify vulnerabilities and mitigate risks. Our proactive approach helps organizations strengthen their defenses, reduce the likelihood of cyberattacks, and ensure a robust security posture.

Threat Hunting

Our threat hunting services proactively search for hidden threats within your environment, identifying malicious activity that may evade traditional security measures. By leveraging advanced tools and expertise, we help organizations detect, contain, and prevent potential cyberattacks before they escalate.