attackers
Is Cybersecurity Having an Identity Crisis?
There has never been a better time to get into cybersecurity, or a worse one. The industry is crying out for professional skills but is also foundering in its efforts to retain ...
ChatGPT for Offensive Security: Five Attacks
ChatGPT is an AI chatbot that uses Natural Language Processing (NLP) combined with the GPT-3 framework to provide human-like responses. NLP allows the model to… ...
Attackers: Modern Day API Cartographers
Attackers are like modern-day cartographers. The cartographers of old weren’t necessarily sailing the coastline of New England, drawing a map as they sailed. Instead, they talked to people who did the sailing ...
Before the Ransomware Attack: 5 Initial Access Methods
Most security teams will agree that having a deep understanding of how attackers gain initial access is the most critical factor in building an effective cybersecurity strategy and stopping ransomware attacks in ...
Why We Should Focus on ‘How,’ not ‘Who,’ of Cyberattacks
Organizations often don’t understand what they need to be protecting themselves from when it comes to costly cyberattacks. The threat landscape is becoming ever more evolved and it’s now rare for a ...
Catch Me If You Can: The Changing Faces of Malware
The reappearance of malware variants shows how platform criminality is enabling hackers to teach old code new tricks The security industry and authorities need to work together to understand how platforms are ...
How Hackers Exploit Online Games
Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ...