Secret Volcano Starburst TV Commercial

Hunting for secrets on GitHub

We need to work with system designers and developers to make them understand that using a secure credential vault with programmatic access is not an optional luxury - it is a basic ...
Are Decade-Old DoS Tools Still Relevant in 2021?

Are Decade-Old DoS Tools Still Relevant in 2021?

| | ddos, DDoS attacks, DoS, hacks
Decade old tools are still effective and being used by threat actors in a world of easy to build IoT botnets & cheap attack services. The post Are Decade-Old DoS Tools Still ...

LinkedIn and LOLBINs

Yet another example of how LinkedIn can be abused by the bad guys… a phishing campaign which used job titles scraped from user profiles to ...

Building a Better SOC Based on What We Learned in 2020

Every network vulnerability opened new opportunities for hackers to infiltrate systems, steal data and wreak havoc. Several notable security incidents have left governments, private organizations, medical systems and large enterprise networks reeling ...

Building a Better SOC Based on What We Learned in 2020

Every network vulnerability opened new opportunities for hackers to infiltrate systems, steal data and wreak havoc. Several notable security incidents have left governments, private organizations, medical systems and large enterprise networks reeling ...

It could happen to anyone…

The headline is eye catching: a data breach at a highly respected security training organization when an employee falls for a phishing email. It is ...

The Top 8 Concerns for CISO’s in 2020

Although a relatively new corporate position, Chief Information Security Officers (CISOs) are becoming an integral part of the corporate hierarchy as enterprises begin to take security concerns more seriously. It's a smart ...

Living off the land – EFS Ransomware

| | hacks
Attackers have responded to improved security against malware in Windows environments by “living off the land” (LOTL) – using the tools already present in the ...

Hacks and Breaches of 2019: A Year in Review

The reality is that most companies and entities are entrusted with sensitive data. As regulations tighten and consumer expectations rise, it is more important than ever to protect data, whenever it is ...
Juice Jacking – meh!

Juice Jacking – meh!

Lately, I have been seeing a number of posts and articles warning us all not to use publicly available USB charging points due to the ...