CyberOnyx Security’s cover photo
CyberOnyx Security

CyberOnyx Security

Computer and Network Security

San Antonio , Texas 290 followers

CyberOnyx is a veteran-owned Managed IT & cybersecurity company.

About us

🔐 CyberOnyx Security | 🪖 Veteran-Owned Cybersecurity Partner for Small and Medium Businesses At CyberOnyx Security, we specialize in delivering personalized, proactive, and around-the-clock IT and cybersecurity solutions tailored for small businesses. As a veteran-owned company with decades of experience in cyber operations, we leverage both offensive and defensive strategies to protect and optimize your organization’s security posture. 💼 Our Services Include: Managed IT & Cybersecurity: 24/7 monitoring, cloud security, and endpoint protection. Offensive Security: Penetration testing, red teaming, and vulnerability assessments. Virtual CISO Services: Strategic cybersecurity leadership, compliance guidance, and risk management. Our mission is simple—protect, strengthen, and empower your business. We combine deep expertise with a commitment to excellence to safeguard your organization from cyber threats . 📍 Based in San Antonio, TX 🤠 & Pensacola, FL 🐊, we proudly support small businesses in the fight against cybercrime. 🔗 Learn more: www.cyberonyx-sec.com

Website
https://www.cyberonyx-sec.com/
Industry
Computer and Network Security
Company size
2-10 employees
Headquarters
San Antonio , Texas
Type
Self-Owned
Founded
2022
Specialties
Penetration Testing, Red Teaming, Ransomware Preparedness , and Cybersecurity Strategy

Locations

Updates

  • CyberOnyx partners with Huntress to deliver unmatched security. Using Huntress SIEM and CyberOnyx's proactive threat hunting, we identified and stopped a threat actor who compromised a VPN, leveraging Active Directory and living-off-the-land binaries and scripts (LOLBins) to maintain persistence. We removed the foothold, cleaned and hardened the environment, and prevented a ransomware disaster for a Texas-based manufacturer. Want the same confidence? Book an Active Directory Assessment with CyberOnyx. We’ll validate your AD, deliver prioritized recommendations, and harden your network so you’re secure before the end of 2025. Get validated today: cyberonyx-sec.com or reach out to info@cyberonyx-sec.com to find out more. #HuntressSIEM #ThreatHunting #ActiveDirectory #RansomwarePrevention #CyberOnyx #MSP #Texas #huntorbehunted

    View organization page for Huntress

    114,312 followers

    SIEM threat hunting stopped an intrusion just seven days after enablement. Here's how: A Texas-based manufacturer enabled Huntress SIEM on October 21st. 🤠 One week later, SIEM earned its keep when a threat actor decided to take a swing: 12:53 pm: The attacker hacks into the VPN. 12:58 pm: They compromise the privileged VPN service account and try to pivot into Active Directory…from a machine named 'kali'. 1:18 pm: Huntress Threat Hunting spots the weak-sauce attempt and shuts it down on sight. Unfortunately for this cybercriminal (and fortunately for our Texan manufacturer), the SOC wrapped this case in just under 30 minutes, catching the hacker at their very first step. Tough break.

    • No alternative text description for this image
    • No alternative text description for this image
  • CyberOnyx Security reposted this

    It's official! Huntress has acquired Inside Agent, a London-based company that specializes in protecting Microsoft 365 environments against external and insider threats. This move pours rocket fuel on what we’re building next: Identity Security Posture Management (ISPM), a proactive engine designed to catch weak identity hygiene *before* adversaries ever get the chance to weaponize it. For details: https://okt.to/PaFDsu Welcome to the hunt! 👏

  • Protecting your data doesn’t have to be complicated, small steps can make a big difference. As cyber threats continue to evolve, it’s more important than ever to stay vigilant. Whether you're traveling for the holidays or working from home, keeping your information secure should be a top priority. Here are four quick tips to help strengthen your cybersecurity posture. And remember, CyberOnyx is here to help keep your business protected every step of the way. #CyberSecurity #DataProtection #StaySafe #CyberOnyx

    • No alternative text description for this image
  • CyberOnyx Security reposted this

    Huntress EDR alerted our SOC to lateral movement. Standard stuff...until we checked the logs. The threat actor had been hiding out for hours, waiting to make their move. The kicker? If this partner had SIEM installed, we would've spotted that shady activity before the plan became a pivot. EDR catches the hit. SIEM reads the windup. 🥊 Run them together, and you stop the sleeper before they start swinging.

  • CyberOnyx Security reposted this

    That pay bump meeting sounded great. But one click *almost* cost this user more than their target number. They received what looked like a legit HR meeting link for a comp review. But instead of opening a calendar invite, their click quietly downloaded a malicious remote access installer. The binary ran as 'C:\Users\<redacted>\Downloads\Access_Documents.exe', which installed a GoToResolve agent and handed the adversary stealthy remote persistence. This isn’t some flashy hack. It’s a low-effort trick that banks on humans behaving like...humans. So how can you stop this play before it starts? - Train users to spot lures, especially HR themes. - Keep a clean, up-to-date asset inventory so rogue tools stand out. - Alert on unknown or unexpected remote management software the second it appears. - Block or quarantine unexpected installers from user download folders and require admin approval for RMM installs. A fake meeting link shouldn’t give an attacker a real foothold. If people are the first line of defense, empower them to wreck hackers where it hurts: at first click.

    • No alternative text description for this image
  • Thanksgiving is just around the corner; a time to rest, recharge, and give thanks for the people and partnerships that make your work meaningful. But while you’re gathering around the table, cybercriminals are still circling, ready to take advantage of the holiday rush and reduced staff. Before you dig into the feast, take a moment to secure your business devices, update passwords, and remind your team to stay cyber-aware. At CyberOnyx, we’re helping small businesses to enjoy peace of mind while they enjoy their Thanksgiving. #Thanksgiving2025 #CyberSecurity #SmallBusiness #CyberAwareness #SMBProtection #StaySecure #CyberOnyx #CyberSafety #HolidaySecurity

    • No alternative text description for this image
  • As 2025 closes, cyber extortion has split into two clear paths: ➡️ High-volume RaaS campaigns hammering the mid-market (led by Akira) ➡️ Targeted, high-cost intrusions aimed at large enterprises But the economics might be collapsing? 💸 Average ransom: $376K (-66% QoQ) 💸 Median ransom: $140K (-65%) 💸 Payment rate: 23% "a record low" Attackers are adapting fast. Social engineering, help-desk abuse, and even insider bribery (like Medusa offering employees a 15% cut) are becoming the new access vectors. The median victim now has 362 employees (+27% QoQ), yet larger targets aren’t paying more. Data theft is now the main weapon: 76% of cases involved exfiltration, compared with fewer encryption-driven attacks. Akira and Qilin still dominate the field, but newer entrants like Lynx and KAWA4096 are testing fresh models as profits thin out. Bottom line: ransomware isn’t fading, it’s evolving under pressure, becoming more selective, creative, and dependent on exploiting trust and identity instead of just unpatched software. At CyberOnyx, we recognize that the threat landscape is ever evolving, and defenders need to evolve with it. As ransomware tactics shift, we'll be there to meet them; delivering intelligence, detection, and response capabilities built for the next generation of extortion threats. #CyberSecurity #Ransomware #ThreatIntelligence #InfoSec #CyberExtortion #RaaS #CISO #DataProtection #IncidentResponse #CyberRisk #CyberOnyx

    • No alternative text description for this image

Similar pages