Technical

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks
As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...

RansomHub Affiliate leverages Python-based backdoor
In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor […] ...

RACE Conditions in Modern Web Applications
The concept of a RACE condition and its potential for application vulnerabilities is nothing new. First mentioned back in the […] ...

Developing and Implementing a Privacy Program
Privacy Privacy has evolved beyond compliance; its relevance in creating brand loyalty and customer trust has proven to build a […] ...

Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)
Operational Technology (OT) and Industrial Control Systems (ICS) are critical components of many industries, especially those within the 16 critical […] ...

Understanding DMARC policies – p=none, p=quarantine, p=reject
Discover how implementing the right DMARC policy in your business can stop email impersonation, protect brand reputation, and boost deliverability ...

How Hackers Steal Your RFID Cards
Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...

How to Make Adversaries Cry: Part 1
In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider
Additional authors: Rui Ataide and Hermes Bojaxhi Executive Summary In early 2024, we identified a current affiliate of the RansomHub […] ...

Leveraging Escalation Attacks in Penetration Testing Environments – Part 1
Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] ...