This Thanksgiving, we at CyberOnyx are grateful for every organization that counts on us to defend their data. Our team shows up like a reliable side dish; always there, always ready, and quietly making everything better. May your holiday be warm, connected, and confidently secure. #Thanksgiving #CyberOnyx #CyberSecurity #DataProtection #Gratitude #SecureByDesign #InfoSec #Thankful #DigitalTrust #StaySecure
CyberOnyx Security
Computer and Network Security
San Antonio , Texas 290 followers
CyberOnyx is a veteran-owned Managed IT & cybersecurity company.
About us
🔐 CyberOnyx Security | 🪖 Veteran-Owned Cybersecurity Partner for Small and Medium Businesses At CyberOnyx Security, we specialize in delivering personalized, proactive, and around-the-clock IT and cybersecurity solutions tailored for small businesses. As a veteran-owned company with decades of experience in cyber operations, we leverage both offensive and defensive strategies to protect and optimize your organization’s security posture. 💼 Our Services Include: Managed IT & Cybersecurity: 24/7 monitoring, cloud security, and endpoint protection. Offensive Security: Penetration testing, red teaming, and vulnerability assessments. Virtual CISO Services: Strategic cybersecurity leadership, compliance guidance, and risk management. Our mission is simple—protect, strengthen, and empower your business. We combine deep expertise with a commitment to excellence to safeguard your organization from cyber threats . 📍 Based in San Antonio, TX 🤠 & Pensacola, FL 🐊, we proudly support small businesses in the fight against cybercrime. 🔗 Learn more: www.cyberonyx-sec.com
- Website
-
https://www.cyberonyx-sec.com/
External link for CyberOnyx Security
- Industry
- Computer and Network Security
- Company size
- 2-10 employees
- Headquarters
- San Antonio , Texas
- Type
- Self-Owned
- Founded
- 2022
- Specialties
- Penetration Testing, Red Teaming, Ransomware Preparedness , and Cybersecurity Strategy
Locations
-
Primary
Get directions
San Antonio , Texas , US
-
Get directions
1 Burnwood
San Antonio, Texas 78254, US
Updates
-
CyberOnyx partners with Huntress to deliver unmatched security. Using Huntress SIEM and CyberOnyx's proactive threat hunting, we identified and stopped a threat actor who compromised a VPN, leveraging Active Directory and living-off-the-land binaries and scripts (LOLBins) to maintain persistence. We removed the foothold, cleaned and hardened the environment, and prevented a ransomware disaster for a Texas-based manufacturer. Want the same confidence? Book an Active Directory Assessment with CyberOnyx. We’ll validate your AD, deliver prioritized recommendations, and harden your network so you’re secure before the end of 2025. Get validated today: cyberonyx-sec.com or reach out to info@cyberonyx-sec.com to find out more. #HuntressSIEM #ThreatHunting #ActiveDirectory #RansomwarePrevention #CyberOnyx #MSP #Texas #huntorbehunted
SIEM threat hunting stopped an intrusion just seven days after enablement. Here's how: A Texas-based manufacturer enabled Huntress SIEM on October 21st. 🤠 One week later, SIEM earned its keep when a threat actor decided to take a swing: 12:53 pm: The attacker hacks into the VPN. 12:58 pm: They compromise the privileged VPN service account and try to pivot into Active Directory…from a machine named 'kali'. 1:18 pm: Huntress Threat Hunting spots the weak-sauce attempt and shuts it down on sight. Unfortunately for this cybercriminal (and fortunately for our Texan manufacturer), the SOC wrapped this case in just under 30 minutes, catching the hacker at their very first step. Tough break.
-
-
Travel season is prime time for cybercriminals, who take advantage of distracted "on the go" users. That’s why reinforcing your digital defenses before you leave is so important. Being proactive now helps ensure your personal and work data stay secure wherever the holidays take you. #CyberAwareness #CyberSafety #SecureYourJourney #CyberOnyx
-
-
CyberOnyx Security reposted this
It's official! Huntress has acquired Inside Agent, a London-based company that specializes in protecting Microsoft 365 environments against external and insider threats. This move pours rocket fuel on what we’re building next: Identity Security Posture Management (ISPM), a proactive engine designed to catch weak identity hygiene *before* adversaries ever get the chance to weaponize it. For details: https://okt.to/PaFDsu Welcome to the hunt! 👏
-
Protecting your data doesn’t have to be complicated, small steps can make a big difference. As cyber threats continue to evolve, it’s more important than ever to stay vigilant. Whether you're traveling for the holidays or working from home, keeping your information secure should be a top priority. Here are four quick tips to help strengthen your cybersecurity posture. And remember, CyberOnyx is here to help keep your business protected every step of the way. #CyberSecurity #DataProtection #StaySafe #CyberOnyx
-
-
CyberOnyx Security reposted this
Huntress EDR alerted our SOC to lateral movement. Standard stuff...until we checked the logs. The threat actor had been hiding out for hours, waiting to make their move. The kicker? If this partner had SIEM installed, we would've spotted that shady activity before the plan became a pivot. EDR catches the hit. SIEM reads the windup. 🥊 Run them together, and you stop the sleeper before they start swinging.
-
CyberOnyx Security reposted this
That pay bump meeting sounded great. But one click *almost* cost this user more than their target number. They received what looked like a legit HR meeting link for a comp review. But instead of opening a calendar invite, their click quietly downloaded a malicious remote access installer. The binary ran as 'C:\Users\<redacted>\Downloads\Access_Documents.exe', which installed a GoToResolve agent and handed the adversary stealthy remote persistence. This isn’t some flashy hack. It’s a low-effort trick that banks on humans behaving like...humans. So how can you stop this play before it starts? - Train users to spot lures, especially HR themes. - Keep a clean, up-to-date asset inventory so rogue tools stand out. - Alert on unknown or unexpected remote management software the second it appears. - Block or quarantine unexpected installers from user download folders and require admin approval for RMM installs. A fake meeting link shouldn’t give an attacker a real foothold. If people are the first line of defense, empower them to wreck hackers where it hurts: at first click.
-
-
Thanksgiving is just around the corner; a time to rest, recharge, and give thanks for the people and partnerships that make your work meaningful. But while you’re gathering around the table, cybercriminals are still circling, ready to take advantage of the holiday rush and reduced staff. Before you dig into the feast, take a moment to secure your business devices, update passwords, and remind your team to stay cyber-aware. At CyberOnyx, we’re helping small businesses to enjoy peace of mind while they enjoy their Thanksgiving. #Thanksgiving2025 #CyberSecurity #SmallBusiness #CyberAwareness #SMBProtection #StaySecure #CyberOnyx #CyberSafety #HolidaySecurity
-
-
As 2025 closes, cyber extortion has split into two clear paths: ➡️ High-volume RaaS campaigns hammering the mid-market (led by Akira) ➡️ Targeted, high-cost intrusions aimed at large enterprises But the economics might be collapsing? 💸 Average ransom: $376K (-66% QoQ) 💸 Median ransom: $140K (-65%) 💸 Payment rate: 23% "a record low" Attackers are adapting fast. Social engineering, help-desk abuse, and even insider bribery (like Medusa offering employees a 15% cut) are becoming the new access vectors. The median victim now has 362 employees (+27% QoQ), yet larger targets aren’t paying more. Data theft is now the main weapon: 76% of cases involved exfiltration, compared with fewer encryption-driven attacks. Akira and Qilin still dominate the field, but newer entrants like Lynx and KAWA4096 are testing fresh models as profits thin out. Bottom line: ransomware isn’t fading, it’s evolving under pressure, becoming more selective, creative, and dependent on exploiting trust and identity instead of just unpatched software. At CyberOnyx, we recognize that the threat landscape is ever evolving, and defenders need to evolve with it. As ransomware tactics shift, we'll be there to meet them; delivering intelligence, detection, and response capabilities built for the next generation of extortion threats. #CyberSecurity #Ransomware #ThreatIntelligence #InfoSec #CyberExtortion #RaaS #CISO #DataProtection #IncidentResponse #CyberRisk #CyberOnyx
-