This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

This Caller Does Not Exist: Using AI to Conduct Vishing Attacks

As technology advances, attackers are quick to adapt, using cutting-edge innovations to craft social engineering attacks that exploit the one […] ...
RansomHub Affiliate leverages Python-based backdoor

RansomHub Affiliate leverages Python-based backdoor

In an incident response in Q4 of 2024, GuidePoint Security identified evidence of a threat actor utilizing a Python-based backdoor […] ...
RACE Conditions in Modern Web Applications

RACE Conditions in Modern Web Applications

The concept of a RACE condition and its potential for application vulnerabilities is nothing new. First mentioned back in the […] ...
Developing and Implementing a Privacy Program

Developing and Implementing a Privacy Program

Privacy Privacy has evolved beyond compliance; its relevance in creating brand loyalty and customer trust has proven to build a […] ...
Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)

Operational Technology (OT) and Industrial Control Systems (ICS) are critical components of many industries, especially those within the 16 critical […] ...
Understanding DMARC policies – p=none, p=quarantine, p=reject

Understanding DMARC policies – p=none, p=quarantine, p=reject

| | dmarc, Technical
Discover how implementing the right DMARC policy in your business can stop email impersonation, protect brand reputation, and boost deliverability ...
How Hackers Steal Your RFID Cards

How Hackers Steal Your RFID Cards

Radio Frequency Identification (RFID) cards are ubiquitously used to authenticate using a physical token. This technology is often embedded in […] ...
How to Make Adversaries Cry: Part 1

How to Make Adversaries Cry: Part 1

In the ever-evolving landscape of cybersecurity, defense against intruders requires constant vigilance and proactive measures. For organizations relying on Active […] ...

Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Additional authors: Rui Ataide and Hermes Bojaxhi Executive Summary In early 2024, we identified a current affiliate of the RansomHub […] ...
Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Leveraging Escalation Attacks in Penetration Testing Environments – Part 1

Authors: George Raileanu and Eugene Mar Introduction Together we aim to explore vulnerabilities within Active Directory Certificate Services (AD CS), […] ...