Targeted attacks

Targeted Attacks Part 3 – The Exploit
Tom Eston | | attacks, Cybersecurity, Digital Privacy, Episodes, Exploit, Exploits, Malware, Monthly Edition, Phishing, Podcast, pretext, Privacy, social engineering, Targeted attacks
In our October monthly episode we finish our three part series on targeted attacks. In this episode we discuss the exploit and malware analysis with special guest Tyler Hudak, Incident Response Practice ...

Targeted Attacks Part 2 – Pretexting and Attack Development
Tom Eston | | attacks, Cybersecurity, Digital Privacy, Episodes, GoPhish, Monthly Edition, Phishing, Podcast, pretext, Privacy, social engineering, Targeted attacks
In our September monthly episode we continue our three part series on targeted attack. In this episode we discuss the pretext and how attackers develop and launch their attacks with special guests ...
Targeted Attacks Part 1 – OSINT and Reconnaissance
Tom Eston | | bec, BEC scams, Business Email Compromise scams, Cybersecurity, Episodes, Monthly Edition, OSINT, Phishing, Podcast, Privacy, Reconnaissance, Shodan, Targeted attacks
In our August monthly episode we start our three part series on targeted attacks. In this episode we focus on OSINT (Open Source Intelligence) and reconnaissance techniques used by attackers in phishing ...

Strong protection in uncertain times
Simon PG Edwards | | 2020, anti-virus, Cybersecurity, endpoint, Hacking, review, security testing, standards, Targeted attacks, test results
A hacker mentality is keeping (computer) virus testing on track. Latest endpoint protection reports now online for enterprise, small business and home users. This is the first in our series of 2020 endpoint protection reports. And ...

Email security: Is it any good against hackers?
Simon PG Edwards | | 2020, Cloud, email, Hacking, Internet, online security, Phishing, review, security testing, standards, Targeted attacks, test results
World’s first in-depth, public test of security services vs. targeted attacks. This email security test report is the product of two years of advanced threat research. We have worked with the security ...

Exposing Targeted Attacks by Observing Privilege Interactions Between Entities
Jacob Sendowski | | Malware, Phishing, Ransomware, Security Awareness, social engineering, Targeted attacks
In May 2019, most of Baltimore’s government computer systems were infected with a new and aggressive ransomware variant named RobbinHood. All servers, with the exception of essential services, were taken offline as ...

Breach Response Test: Kaspersky Anti Targeted Attack Platform
Testing anti-breach products needs the full chain of attack. Kaspersky Lab should be congratulated, not only for engaging with this new and challenging test, but for submitting a product that performed so ...

Breach Response Test: Symantec Endpoint Security Complete
Testing anti-breach products needs the full chain of attack. Symantec's endpoint detection and response offering, Symantec Endpoint Security Complete, is the first to face our brand new Breach Response Test. Report now ...

SE Labs Annual Report 2019
Simon PG Edwards | | 2019, anti-virus, email, Hacking, predictions, security testing, standards, startup, Targeted attacks, test results
SE Labs has been working at the core of the cyber security industry since its launch in 2016. We work with all of the major developers of IT security products as well ...

Targeted attacks with public tools
Over the last few years we have tested more than 50 different products using over 5,000 targeted attacks. And there's news, both good and bad. In this article we will look at ...