Prodaft

Prodaft company information, Employees & Contact Information

Explore related pages

Related company profiles:

Cybercrime, data leakage, corporate espionage, and fraud can be financially and morally damaging for companies. PRODAFT (Proactive Defense Against Future Threats), helps prevent the significant impact of cybercrime operations. With over 10 years of experience and 20+ years of knowledge in cyber security, we are proud to be among one of the most respected pioneers of our industry. As PRODAFT, we aim to create a security atmosphere where awareness, proper education, intelligence, and mindset matter. We care about security enthusiasts who strive to develop themselves. That's why we work as hard as we can to assist new participants of our industry with collective events, projects, and training. PRODAFT offers customized and proactive defense against constantly evolving cyber-attack techniques. Our cyber threat intelligence platform, USTA, is a crucial solution for various critical sectors that include: • Banking and Finance • E-Commerce • Fintech • Aviation • Insurance • Energy • Logistics • IoT • Defense • Telecommunications Thanks to our unique synergy of tactical intelligence, fraud intelligence, brand protection, and security intelligence, we monitor physical, cyber, or hybrid attack techniques and scenarios of the attackers 24/7. Find out more about us: https://www.prodaft.com
Looking for a particular Prodaft employee's phone or email?

Prodaft Questions

News

PRODAFT detects high-severity flaws in mySCADA myPRO Manager, warns of industrial network breaches - Industrial Cyber

PRODAFT detects high-severity flaws in mySCADA myPRO Manager, warns of industrial network breaches Industrial Cyber

Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts - Dark Reading | Security

Threat Intel Firm Offers Crypto in Exchange for Dark Web Accounts Dark Reading | Security

From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure - Recorded Future

From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure Recorded Future

EncryptHub breaches 618 orgs to deploy infostealers, ransomware - BleepingComputer

EncryptHub breaches 618 orgs to deploy infostealers, ransomware BleepingComputer

Attackers exploit Fortinet flaws to deploy Qilin ransomware - Security Affairs

Attackers exploit Fortinet flaws to deploy Qilin ransomware Security Affairs

Iranian espionage group Subtle Snail targets European telecom, aerospace, defense firms - Industrial Cyber

Iranian espionage group Subtle Snail targets European telecom, aerospace, defense firms Industrial Cyber

BlackBasta Ransomware Chatlogs Leaked Online - Infosecurity Magazine

BlackBasta Ransomware Chatlogs Leaked Online Infosecurity Magazine

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware - The Hacker News

UNC1549 Hacks 34 Devices in 11 Telecom Firms via LinkedIn Job Lures and MINIBIKE Malware The Hacker News

LARVA-208 Hackers Steal Logins and Deploy Ransomware in Attack on 618 Organizations - Cyber Press

LARVA-208 Hackers Steal Logins and Deploy Ransomware in Attack on 618 Organizations Cyber Press

The rise and fall of the Conti ransomware group - Global Initiative against Transnational Organized Crime (GI-TOC)

The rise and fall of the Conti ransomware group Global Initiative against Transnational Organized Crime (GI-TOC)

A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims - TechCrunch

A huge trove of leaked Black Basta chat logs expose the ransomware gang’s key members and victims TechCrunch

Top Cyber Threats During: 21st July – 27th July 2025 - Crowe

Top Cyber Threats During: 21st July – 27th July 2025 Crowe

Warning: Hacker Might Be Prepping This Steam Game to Spread Malware - Yahoo! Tech

Warning: Hacker Might Be Prepping This Steam Game to Spread Malware Yahoo! Tech

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations - The Hacker News

FIN7, FIN8, and Others Use Ragnar Loader for Persistent Access and Ransomware Operations The Hacker News

The LockBit takedown: Law enforcement ‘trolls’ ransomware gang - Global Initiative against Transnational Organized Crime (GI-TOC)

The LockBit takedown: Law enforcement ‘trolls’ ransomware gang Global Initiative against Transnational Organized Crime (GI-TOC)

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals - BleepingComputer

Cybersecurity firm buying hacker forum accounts to spy on cybercriminals BleepingComputer

Prodaft report throws light on financially motivated Wizard Spider cybercrime group - Industrial Cyber

Prodaft report throws light on financially motivated Wizard Spider cybercrime group Industrial Cyber

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing - The Hacker News

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News

Prodaft details FIN7 cybercrime gang exploiting software supply chains, distributing malicious USB sticks - Industrial Cyber

Prodaft details FIN7 cybercrime gang exploiting software supply chains, distributing malicious USB sticks Industrial Cyber

Conti ransomware gang suffers security breach - The Record from Recorded Future News

Conti ransomware gang suffers security breach The Record from Recorded Future News

Threat Actor Leaked Data from Major Bulletproof Hosting Medialand - CybersecurityNews

Threat Actor Leaked Data from Major Bulletproof Hosting Medialand CybersecurityNews

FIN7 hackers create auto-attack platform to breach Exchange servers - BleepingComputer

FIN7 hackers create auto-attack platform to breach Exchange servers BleepingComputer

Swiss Firm Says It Has Accessed Servers of a SolarWinds Hacker - Bloomberg

Swiss Firm Says It Has Accessed Servers of a SolarWinds Hacker Bloomberg

New Fully Undetected Anubis Malware Let Hackers Execute Remote Commands - CybersecurityNews

New Fully Undetected Anubis Malware Let Hackers Execute Remote Commands CybersecurityNews

RIG Exploit Kit still infects enterprise users via Internet Explorer - BleepingComputer

RIG Exploit Kit still infects enterprise users via Internet Explorer BleepingComputer

Top Prodaft Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant