Alert: New DLL Variant Used For Malicious Code Execution

Recent research findings have brought to light a new DLL variant pertaining to search order hijacking techniques. As per recent reports, this dynamic link library variant could potentially be used by threat ...
SMBs, threats, shutdown SMBs cybercriminals business ransomware malware Kaseya 6 Ways Poor Cybersecurity Hurts Businesses

Are Proof-of-Concepts Benefiting Cybercriminals?   

Public proof-of-concepts (POCs) may be helping cybercriminals more than the organizations they were designed to protect. Sophos’ Active Adversary Playbook 2022 provides an in-depth analysis of cyberattacker behavior, tactics and tools from ...
Security Boulevard
VMware vulnerability virtualization Mandiant

Red Teams and the Value of Open Source PoC Exploits

Red Teams are a necessary part of a good cybersecurity program. The Red Team is offensive security, explained Richard Tychansky, a security researcher speaking at (ISC)2 Security Congress. During the Red Team ...
Security Boulevard
IONIX software supply chain, secure, Checkmarx Abnormal Security cyberattack supply chain cybersecurity

6 Best Practices to Make the Most of Your Sandbox Proof of Concept

Any time you incorporate a major new component—such as a sandbox platform—into your security ecosystem, it’s important to do a rigorous, side-by-side evaluation of competing products to determine the best choice for ...
Security Boulevard
Researchers aim to befuddle cybercriminals with defensive WWII fighter pilot trick

Researchers aim to befuddle cybercriminals with defensive WWII fighter pilot trick

Most ethical hackers prefer to lend their services to eliminate potentially harmful bugs. But one team of white hats wants to test the opposite approach to thwarting bad actors – by wasting ...
Allowing Vendors VPN access during Product Evaluation

Allowing Vendors VPN access during Product Evaluation

For many prospective buyers of the latest generation of network threat detection technologies it may appear ironic that these AI-driven learning systems require so much manual tuning and external monitoring by vendors ...