CyberPrism

81 posts

CyberPrism banner
CyberPrism

CyberPrism

@CyberPrismApp

Cyber Intelligence made Accessible

Katılım Şubat 2025
32 Takip Edilen12 Takipçiler
Sabitlenmiş Tweet
CyberPrism
CyberPrism@CyberPrismApp·
🚀 CyberPrism has been completely rebuilt. Pick your industry and tech stack to build your hub Your Hub shows: 🔍 CVEs affecting YOUR vendors 🎯 Ransomware alerts hitting YOUR industry 💀 Threat actors targeting YOUR stack 📡 Threat intel relevant to YOUR world 🤖 Weekly personalized Vector Briefings for YOU 🔇 No noise. No account needed. Works offline.
English
0
1
1
104
CyberPrism
CyberPrism@CyberPrismApp·
hard to keep up with how many situations that need monitoring.
CyberPrism tweet mediaCyberPrism tweet mediaCyberPrism tweet media
English
1
0
0
10
CyberPrism
CyberPrism@CyberPrismApp·
and you can read simplified threat intel that explains more about these CVEs and threat actors, like DarkSword campaign that led Google to attribute these KEVs to the threat actor
CyberPrism tweet media
English
0
0
0
15
CyberPrism
CyberPrism@CyberPrismApp·
got this in the app, searched online and found the Reddit post Rajagiri Hospital Ransomware Incident Alert Group: thegentlemen
CyberPrism tweet mediaCyberPrism tweet media
English
1
0
0
16
CyberPrism
CyberPrism@CyberPrismApp·
Introducing RIPD — our kill chain framework that distills MITRE ATT&CK's 14 tactics into 4 phases: 🔵 Recon → 🟠 Infil → 🟣 Pivot → 🔴 Detonate The narrative lens for ATT&CK, built for mobile 📱
CyberPrism tweet media
English
1
0
0
21
CyberPrism
CyberPrism@CyberPrismApp·
next version will refactor the Threat Actor section to be a premium experience. Introducing RIPD (pronounced Ripped) kill chain, it maps to MITRE but is simpler and more mobile-friendly Both CyberPrism data and MITRE data will align to it
CyberPrism tweet mediaCyberPrism tweet media
English
1
0
0
25
CyberPrism
CyberPrism@CyberPrismApp·
Check the box compliance -> prompt engineering compliance
Ryan@ohryansbelt

Delve, a YC-backed compliance startup that raised $32 million, has been accused of systematically faking SOC 2, ISO 27001, HIPAA, and GDPR compliance reports for hundreds of clients. According to a detailed Substack investigation by DeepDelver, a leaked Google spreadsheet containing links to hundreds of confidential draft audit reports revealed that Delve generates auditor conclusions before any auditor reviews evidence, uses the same template across 99.8% of reports, and relies on Indian certification mills operating through empty US shells instead of the "US-based CPA firms" they advertise. Here's the breakdown: > 493 out of 494 leaked SOC 2 reports allegedly contain identical boilerplate text, including the same grammatical errors and nonsensical sentences, with only a company name, logo, org chart, and signature swapped in > Auditor conclusions and test procedures are reportedly pre-written in draft reports before clients even provide their company description, which would violate AICPA independence rules requiring auditors to independently design tests and form conclusions > All 259 Type II reports claim zero security incidents, zero personnel changes, zero customer terminations, and zero cyber incidents during the observation period, with identical "unable to test" conclusions across every client > Delve's "US-based auditors" are actually Accorp and Gradient, described as Indian certification mills operating through US shell entities. 99%+ of clients reportedly went through one of these two firms over the past 6 months > The platform allegedly publishes fully populated trust pages claiming vulnerability scanning, pentesting, and data recovery simulations before any compliance work has been done > Delve pre-fabricates board meeting minutes, risk assessments, security incident simulations, and employee evidence that clients can adopt with a single click, according to the author > Most "integrations" are just containers for manual screenshots with no actual API connections. The author describes the platform as a "SOC 2 template pack with a thin SaaS wrapper" > When the leak was exposed, CEO Karun Kaushik emailed clients calling the allegations "falsified claims" from an "AI-generated email" and stated no sensitive data was accessed, while the reports themselves contained private signatures and confidential architecture diagrams > Companies relying on these reports could face criminal liability under HIPAA and fines up to 4% of global revenue under GDPR for compliance violations they believed were resolved > When clients threaten to leave, Delve reportedly pairs them with an external vCISO for manual off-platform work, which the author argues proves their own platform can't deliver real compliance > Delve's sales price dropped from $15,000 to $6,000 with ISO 27001 and a penetration test thrown in when a client mentioned considering a competitor

English
0
0
0
45
CyberPrism
CyberPrism@CyberPrismApp·
cooking again. The threat actors were always meant to be a value add
English
0
0
0
32
CyberPrism
CyberPrism@CyberPrismApp·
It’s a follow-up to this piece: Insights: Increased Risk of Wiper Attacks Here’s a summary:
CyberPrism tweet media
English
1
0
0
16
CyberPrism
CyberPrism@CyberPrismApp·
Iranian Cyber Threat Evolution: From MBR Wipers to Identity Weaponization Unit 42 has a great follow up write up on state-sponsored threat actor TTPs from Iran. Here’s a summary
CyberPrism tweet media
English
1
0
0
31
CyberPrism
CyberPrism@CyberPrismApp·
Starbucks Coffee Company Data Breach Alert
CyberPrism tweet media
English
1
0
0
31
CyberPrism
CyberPrism@CyberPrismApp·
get a weekly threat intel brief customized to your tech stack and industry:
English
1
1
0
47
CyberPrism
CyberPrism@CyberPrismApp·
Reports of Royal Bahrain Hospital Incident Alert Group: payload
CyberPrism tweet media
English
0
0
0
82