Mastering Vulnerability Management Tools & Automation

Vulnerability Management: A Race Against Time & Complexity

| | research
The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation ...
Fraudulent email domain tracker: April 2025

Fraudulent email domain tracker: April 2025

| | research
This is the first release in a new Castle series highlighting email domains associated with fraudulent activity. Our goal is to provide visibility into email infrastructure commonly abused by bots and fraudsters, ...
Assessment of DPRK IT Worker Tradecraft | Nisos Research 2025

Assessment of DPRK IT Worker Tradecraft | Nisos Research 2025

| | Blog, research
Nisos Assessment of DPRK IT Worker Tradecraft | Nisos Research 2025 Since early 2023 Nisos has been investigating and monitoring North Korean (DPRK) IT workers, who use fake personas and stolen identities ...
This Is What Happens When You Reply To A Spam Email | James Veitch | TED.com

How Deepfakes Resurrect the Nigerian Prince Scam 

| | Blog, research
By Veriti Research, April 24th  The infamous “Nigerian prince” scam, once a laughable email trope, has taken on a far more dangerous form in the era of Generative AI (GenAI). Veriti Research ...
Understanding disposable emails

Understanding disposable emails

| | research
Disposable email addresses are temporary inboxes that allow users to receive messages without linking the address to a long-term identity. Unlike Gmail or Outlook, which are built for ongoing use and personal ...
How dare you trust the user agent for bot detection?

How dare you trust the user agent for bot detection?

| | research
In every HTTP request, the user agent header acts as a self-declared identity card for the client—typically a browser—sharing information about the software and platform supposedly making the request. It usually includes ...

Trump vs. Biden Cyber Strategy — According to AI 

| | Blog, research
We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis ...
Vulnerability Management: A Race Against Time & Complexity

Vulnerability Management: A Race Against Time & Complexity

| | research
The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation ...
DEF CON 20 - Marlinspike Hulton and Ray - Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2

The Renaissance of NTLM Relay Attacks: Everything You Need to Know

NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive ...
Top U.S. Higher Education DMARC adoption

DMARC Adoption in U.S. and Canada Higher Education Sector

We’re looking at how DMARC adoption is shaping the email security landscape of colleges and universities in North America ...