2025 Cyberseer SOC Threat Findings Report

Background
share close

Unlock Key Insights
Cyberseer 2025 Threat Findings Report

Cyberseer Sets the Bar High:
Threats Responded to in Under 15 Minutes Over the Last 52 Weeks.

H1 2025 Cyberseer SOC Threat Findings Report

Cyber threats are evolving—are you prepared?

From sophisticated AiTM phishing to malware persistence to the abuse of trusted tools like PowerShell and VPNs, attackers are finding new ways to evade defences.

Inside the report, you’ll find real-world examples of how our SOC, armed with advanced threat technology, uncovered and stopped threats in their tracks.

Key Findings and Recommendations

BEC Evolution:

AiTM phishing bypasses MFA with fake DocuSign portals in SharePoint links.

Email Forwarding Exploitation:

Attackers leverage compromised accounts to exfiltrate data.

MFA Fatigue:

Users unknowingly approve fraudulent logins due to excessive prompts.

Malware Persistence:

LUMMA STEALER malware uses PowerShell scripts and registry tweaks to evade detection.

Security Gaps Exposed:

Simulated attacks reveal misconfigurations, detection delays, and response weaknesses.

Admin Tool Abuse:

Attackers exploit trusted tools like PowerShell and VPNs to stay undetected.

EDR + SIEM:

Integrated detection is critical for stopping lateral movement and correlating threats across networks.

Proactive Threat Hunting:

Identifying and mitigating threats before breaches occur.

Automated Response:

Rapid containment of high-severity threats through automated security actions.

Enhance your cybersecurity posture and embrace the future of threat detection with Cyberseer’s SOC services.

Review blogs of newly discovered threats and smart technologies written by the Cyberseer SOC team.e

Have questions, need assistance, or ready to enhance your cybersecurity strategy? Our team at Cyberseer is here to help. Reach out to us for personalised and expert advice.