Rain Financial Case Study

Rain Financial founders AJ Nelson and Joseph Dallago share how Synack’s Crowdsourced Security Testing delivers a quality penetration test, adversarial intelligence, and security audit that Bahrain’s recently-launched currency exchange needs to mitigate cyber risk. “This industry can’t be like the Wild West for poor security. As a digital currency exchange, we are a security company..
Read more

Essential Elements of a Penetration Test

It is estimated that up to $5.2 trillion in global value is at risk of cybercrime over the next five years. To protect themselves from being hacked and in response to increased compliance and regulations, organizations have traditionally performed penetration testing once or twice a year. A growing number of development organizations build and release..
Read more

Live Magecart Attack Demo

The recent string of Magecart, digital skimming and other client-side attacks have left businesses exposed to data theft, compliance penalties and brand damage. But how do these attacks actually happen? In this on-demand webinar, PerimeterX security experts will perform a live simulation of a Magecart attack. You will learn about: • Methods and tricks used..
Read more

Identifying Web Attack Indicators

Attackers are always looking for ways into web and mobile applications. The 2019 Verizon Data Breach Investigation Report listed web applications the number ONE vector attackers use when breaching organizations. In this paper, we examine malicious web request patterns for four of the most common web attack methods and show how to gain the context and..
Read more

Open and Dark Web Research: Tips and Techniques

Cyber threat intelligence’s alignment with the traditional, OSINT processes of our intelligence community, law enforcement, and the military continues to grow. At Authentic8, a team of experienced cross-functional intelligence analysts builds “Flash Reports” for the readers to augment their OSINT techniques. Authentic8 has packaged some of these reports to help researchers leverage cross-functional OSINT tactics..
Read more