How hackers use CAPTCHA to evade automated detection

How hackers use CAPTCHA to evade automated detection

| | Security Awareness
Introduction CAPTCHA seems to be everywhere we look. These sloppy characters are on blogs, ticket websites, shopping portals — you name it. Those cars you need to spot in a block of images before you can access a website? That’s CAPTCHA too. CAPTCHA was invented to help sites distinguish human ... Read More

The State of Ransomware 2020: Key findings from Sophos & Malwarebytes

| | Security Awareness
Introduction Ransomware has become one of the most common and well-known threats to cybersecurity. 2020 saw a notable increase in ransomware attacks specifically on enterprise entities, as many organizations found themselves in the crosshairs of malicious actors. These attacks are becoming increasingly complex, as cybercriminals leverage new and sophisticated techniques ... Read More

Top 5 ways ransomware is delivered and deployed

| | Malware Analysis
Introduction If your computer has not yet been affected by ransomware, odds are it could soon be. With ransom payments averaging more than $80,000 in Q4 2019, the coveted malicious software is fast... Go on to the site to read the full article ... Read More

How to spot a malicious browser extension

| | Malware Analysis
Introduction Let’s not kid ourselves — the experience of surfing the web wouldn’t be the same without extensions. Browser extensions make it possible to block advertisements, change the appearance of... Go on to the site to read the full article ... Read More

6 Windows event log IDs to monitor now

| | Online Events
Introduction It’s possible to use Windows 10 event logs to detect intrusions and malicious activity, but some knowledge of critical IDs is mandatory to avoid over-collection and other issues. This... Go on to the site to read the full article ... Read More

21 cybersecurity products to combat APT29: MITRE weighs in

| | MITRE ATT&CK
Introduction MITRE, a not-for-profit organization based in the US, is best known for its globally accessible knowledge base of cyber adversary strategies and techniques popularly referred to as the... Go on to the site to read the full article ... Read More

RTS Threshold Configuration for Improved Wireless Network Performance [Updated 2020]

In a scenario where a lot of users connect to a wireless network and where they occasionally lose their connections, an individual or a company can tweak the wireless router’s advanced settings to... Go on to the site to read the full article ... Read More

Top 8 cybersecurity books for incident responders in 2020

| | General Security
Introduction Are you passionate about incident response? Do you want to build upon your knowledge of how to mitigate cyberthreats? If yes, then you’d love the nuggets of wisdom these cybersecurity... Go on to the site to read the full article ... Read More

How to identify and prevent firmware vulnerabilities

| | General Security
Introduction As creators of computer software begin to take security vulnerabilities more seriously, hackers are increasingly targeting the lower ends of the computer stack in hopes of stealing... Go on to the site to read the full article ... Read More
Reconstruction of actual vishing call to a small business - Archie Hicks

Vishing spikes as workforces go remote: 6 vishing prevention tips anyone can follow

Introduction With thousands of teams worldwide being asked to work remotely to help contain the spread of COVID-19, scammers have a fertile ground to prey upon telecommuters. One scam that workers... Go on to the site to read the full article ... Read More