COMPANY
Who we are
WE ARE CYBORG SECURITY
Founded in 2019, Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.
We have a simple goal: to empower threat hunters and analysts to proactively search for threats in their environment using current, validated content.
ABOUT CYBORG SECURITY
CYBORG SECURITY EMPOWERS THREAT HUNTERS
Across all those fields we saw a trend: security teams still struggle with threat hunting and detection.
Our mission at Cyborg Security is simply to “empower the hunter to find the bad.” That means providing the customized content, guidance, and validation tools they need to run consistent, repeatable, and effective threat hunts.
To achieve our mission, we focus on two things: empowerment and leadership.

LEADERSHIP
In light of this, we aim to start a movement within the broader security community to focus on what matters: giving threat hunters and analysts the tools they need to hunt down threats in the real world.
EMPOWERMENT
To empower them, we provide advanced threat hunt and detection packages that are fully customized to the customer’s environment. This enables threat hunting teams to:
- Deploy hunts in a fraction of the time.
- Run far more hunts each month.
- Detect the latest threats within days.
- Focus on the most relevant threats.
Featured Posts

Qakbot
Qakbot malware (also known as: QakBot, Quakbot, Pinkslipbot) is a prevalent information-stealing malware that was discovered in 2007.

MSPs Have Unique Advantages in Threat Hunting – Strength in Numbers
Implementing robust security strategies can help mitigate the risk of cyber threats, especially in the early stages of an attack. However, implementing a “robust security

Follina Vulnerability – CVE-2022-30190
Follina (CVE-2022-30190) or the remote code execution vulnerability discovered that will abuse the Microsoft Windows Support Diagnostic Tool (MSDT.exe) in order to exploit and execute remote code was observed in Late May of 2022. The vulnerability itself was first mentioned by a security research group named “Nao Sec” via Twitter on May 27th and acknowledged by Microsoft on May 31st.