Cyvore Wins 3rd Place at Tech1: A New Signal in Cyber Defense

We’re proud to announce that Cyvore has claimed 3rd place in the 2025 Tech1 Competition, securing a spot on the podium among Israel’s most promising tech ventures. Held in Eilat, Tech1 brings together the top early-stage startups redefining the future across sectors like AI, cybersecurity, and digital infrastructure. For us, this recognition is a strong signal […]

Cyvore Named Finalist in Tech1 Podium Competition

Cyvore has been selected as a finalist in the 2025 Tech1 Podium Competition, joining a shortlist of startups leading the next wave of innovation in Israel. Held May 18-20 in Eilat, Tech1 highlights bold technologies with global impact. Cyvore will present how our platform protects digital communication spaces- where deepfake impersonations, phishing, and real-time manipulation […]

Cyvore Featured in CTech: Out of Stealth and Into the Fight Against Modern Threats

The company has raised a total of $2.5 million to address the escalating threats in modern communication channels like Zoom, Teams, Slack, WhatsApp, and more. We’re proud to share that Cyvore has officially emerged from stealth, and the news is making waves. In an exclusive Startup Boarding Pass feature by CTech by Calcalist, our founders- Ori Segal (CEO), Yiftach Rotem (CPO), […]

The Dangers of OSINT and Spear-Phishing- Part 3

Man-in-the-Middle Attacks Assaf Reich Intro After we discussed OSINT, Phishing, and Spear-Phishing, Let’s try out a more involved attack vector and see how an open-source can be used to phish victims and steal their session credentials easily. This is important in order to keep up to date with current attack tools and to learn how […]

The Dangers of OSINT and Spear-Phishing-Part 2

Deploying the malicious payload Assaf Reich Hello, world! Assaf here once again, picking up where we left off in the first part of this series – OSINT reconnaissance. In this article I’ll demonstrate how we can use what we learned about our target, Eric Blum, to hack his computer and steal his personal data. Intro […]

Cyvore CEO Ori Segal on the Growing Threat of Cyber Attacks

How Cybercriminals are Exploiting Digital Workspaces- Insights from Ori Segal’s TV Interview Cyber threats have evolved, and today, attacks are happening far beyond email. With 3.4 billion phishing attacks occurring daily, hackers are leveraging deepfake technology, AI-driven scams, and social engineering tactics to bypass traditional security defenses. Ori Segal, CEO & Co-Founder of Cyvore, joined Channel 10’s Economy […]

Password Theft on the High Seas: The PirateFi Game Malware

Opening Hello, world! I’m Assaf, and as always, I’m here to break down the latest in cybersecurity threats. In this article, we’re diving into a recent case of malware hidden inside a Steam game, how it managed to bypass security checks, and what it means for both gamers and enterprises. On February 6th 2025, a game was released […]

The Dangers of OSINT and Spear-Phishing

Part 1 – OSINT reconnaissance Assaf Reich Hello, world! I’m Assaf and as the title suggests, in this article series I will walk you through the dangers of OSINT and spear-phishing with examples and sources. By now, it’s fairly well known: don’t trust emails from unknown senders, and don’t open links from strange SMS messages. […]

The $25 Million Deepfake Scam: Why CISOs Must Rethink Digital Security

Introduction Cyber threats are evolving at an alarming rate, and attackers are leveraging AI-driven tools to exploit vulnerabilities in ways we never imagined. A recent case in Hong Kong saw a multinational firm fall victim to a $25 million fraud, executed through deepfake technology that convincingly impersonated an executive over a video call. This incident is […]

Beyond Phishing: The Next Wave of Social Engineering Cyber Attacks

Introduction Phishing attacks have long been the primary entry point for cybercriminals, but today, attackers are evolving beyond traditional email scams. Social engineering attacks are becoming more psychologically sophisticated, bypassing standard defenses and directly targeting human vulnerabilities. One recent case involved a multi-million dollar theft orchestrated entirely over a Zoom call– where an attacker posed as an […]