research

Vulnerability Management: A Race Against Time & Complexity
The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation ...

Fraudulent email domain tracker: April 2025
This is the first release in a new Castle series highlighting email domains associated with fraudulent activity. Our goal is to provide visibility into email infrastructure commonly abused by bots and fraudsters, ...

Assessment of DPRK IT Worker Tradecraft | Nisos Research 2025
Nisos Assessment of DPRK IT Worker Tradecraft | Nisos Research 2025 Since early 2023 Nisos has been investigating and monitoring North Korean (DPRK) IT workers, who use fake personas and stolen identities ...

How Deepfakes Resurrect the Nigerian Prince Scam
By Veriti Research, April 24th The infamous “Nigerian prince” scam, once a laughable email trope, has taken on a far more dangerous form in the era of Generative AI (GenAI). Veriti Research ...

Understanding disposable emails
Disposable email addresses are temporary inboxes that allow users to receive messages without linking the address to a long-term identity. Unlike Gmail or Outlook, which are built for ongoing use and personal ...

How dare you trust the user agent for bot detection?
In every HTTP request, the user agent header acts as a self-declared identity card for the client—typically a browser—sharing information about the software and platform supposedly making the request. It usually includes ...
Trump vs. Biden Cyber Strategy — According to AI
We asked an AI agent to analyze the latest shift in U.S. cybersecurity policy, comparing past strategies under Biden to the new 2025 Trump Executive Order. The result? A surprisingly structured analysis ...

Vulnerability Management: A Race Against Time & Complexity
The post Vulnerability Management: A Race Against Time & Complexity appeared first on AI Security Automation ...

The Renaissance of NTLM Relay Attacks: Everything You Need to Know
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive ...

DMARC Adoption in U.S. and Canada Higher Education Sector
We’re looking at how DMARC adoption is shaping the email security landscape of colleges and universities in North America ...