Syndicated Blog

Hysolate
Threat Detection for the Cloud Enterprise
Behind the Attack: Account Takeover (ATO)

Behind the Attack: Account Takeover (ATO)

In this blog we explore the kill chain of a compromised mailbox, after a user has undergone an Account Takeover (ATO) attack. The post Behind the Attack: Account Takeover (ATO) appeared first ...
AI: The Double-Edged Sword of Cybersecurity

AI: The Double-Edged Sword of Cybersecurity

Attackers are using AI in their cyber offense, but cybersecurity leaders can also take advantage of AI in their defense. The post AI: The Double-Edged Sword of Cybersecurity appeared first on Perception ...
Hackers Use Password-Protected OneNote Files to Spread Malware

Hackers Use Password-Protected OneNote Files to Spread Malware

In this blog, we explore a new attack in which threat actors exploit encrypted OneNote documents to deliver malware. The post Hackers Use Password-Protected OneNote Files to Spread Malware appeared first on ...
What Goes “App” Could Take You Down

What Goes “App” Could Take You Down

Files "are like a box of chocolates, you never know what you're going to get". In this blog, we cover the risks of malicious file uploads to web apps and the best ...
Learn how to check your security blind spots and protect your organization.  Download the whitepaper, here.

There’s Nothing “Meta” About Phishing for Credentials

There’s a new sophisticated phishing campaign making its rounds that aims to trick Facebook users into giving scammers their account credentials and PII by leveraging validation processes to seem credible. The post ...
3 Key Takeaways from the 2023 Gartner® Market Guide for Email Security

3 Key Takeaways from the 2023 Gartner® Market Guide for Email Security

As email continues to be the primary vector for cyber attacks, staying up to date with the latest developments in email security is essential. In this blog post, we examine key insights ...
One for the Show, Two for the Money

One for the Show, Two for the Money

Hundreds of legitimate websites are being used in two-step phishing attacks. Novel computer vision models can prevent them from reaching users' inboxes. The post One for the Show, Two for the Money ...
Behind the Attack: Paradies Clipper Malware

Behind the Attack: Paradies Clipper Malware

| | attack trends
In this blog we cover a new underground Clipper malware that allows attackers to replace a victim's crypto wallet with their own. The post Behind the Attack: Paradies Clipper Malware appeared first ...

Takeaways from the CircleCI Incident

| | attack trends
Continuous integration and delivery platform CircleCI confirmed that a security incident occurred on January 04, 2023 and was caused by an infostealer being deployed on an employee’s laptop. Because the targeted employee ...

Malicious Office Macros: Detecting Similarity in the Wild

| | research
In this blog, we focus on similarity in the context of Microsoft Office macros, which are widely exploited by attackers to deliver malware. The post Malicious Office Macros: Detecting Similarity in the ...