Attack
Emotet Is Back and It’s Targeting Local and State Governments, CISA Warns
The Emotet botnet is picking up steam again, according to an advisory issued by the Cybersecurity and Infrastructure Security Agency (CISA). The agency directly warns state and local governments because they appear ...
Seychelles Bank Doesn’t Know How It Got Infected with Ransomware Last Week
The Development Bank of Seychelles (DBS) has suffered a ransomware attack that remains a mystery as to how it occurred, almost a full week after the fact. The bank notified the country’s ...
Akamai Registers Massive 1.44 Terabit-per-second DDoS Attack
An unnamed webhost was just hit with one of the largest DDoS attacks ever registered by Akamai, one of the world’s biggest web and cloud providers. The attack was directed at a ...
Clickjacking Attacks: What They Are and How to Prevent Them
Clickjacking refers to any attack where the user is tricked into unintentionally clicking an unexpected web page element. The name was coined from click hijacking, and the technique is most often applied ...
How Buffer Overflow Attacks Work
A computer program may be vulnerable to buffer overflow if it handles incoming data incorrectly. Anybody who can provide suitably crafted user input data can cause such a program to crash. Even ...
What is a Man-in-the-Middle Attack and How To Avoid It?
A man-in-the-middle attack (MiTM) happens when an attacker modifies a connection so that it goes through their computer. They can steal sensitive information and change data on the fly. For example, imagine ...
ATT&CK Structure Part I: A Taxonomy of Adversarial Behavior
Following last year’s exceedingly successful inaugural MITRE ATT&CK™ conference, this year’s highly anticipated ATT&CKcon 2.0 conference will be held from Oct 28-30 at MITRE’s McLean headquarters. MITRE’s always open to hearing feedback ...
No One is Safe: the Five Most Popular Social Engineering Attacks Against Your Company’s Wi-Fi Network
Your Wi-Fi routers and access points all have strong WPA2 passwords, unique SSIDs, the latest firmware updates, and even MAC address filtering. Good job, networking and cybersecurity teams! However, is your network ...
Clickjacking Attack on Facebook: How a Tiny Attribute Can Save the Corporation
The clickjacking attack introduced in 2002 is a UI Redressing attack in which a web page loads another webpage in a low opacity iframe, and cause changes of state when the user ...
Podcast: CISO Speak – Incident Response
This months podcast features host Larry Bianculli speaking with guest CISO Agim Bracovic from Rabobank, as well as our very own Matthew Pascucci, cybersecurity practice manager, at CCSI, on Incident Response. How ...

