How Should Zero Trust Apply to Phishing?

Isolation for Zero Trust Phishing Protection Phishing sites frequently evade web and email filters because of the inability of secure gateways to detect new phishing websites or categorize them properly. According to ...

The URL “Danger Zone”

Inadequate Security Policies with Uncategorized Sites The challenge most email gateways face is how to protect against URL-based threats that exist within a “danger zone”— the period when phishing sites are allowed ...

Detecting the New CallStranger UPnP Vulnerability With Zeek

By Ryan Victory, Corelight Security Researcher On June 8, Yunus Çadırcı, a cybersecurity senior manager at EY Turkey released a whitepaper and proof of concept code repository for a newly discovered vulnerability ...
Tabnabbing Protection Bypass

Tabnabbing Protection Bypass

Since its inception, the Uniform Resource Locator (URL) has been a fundamental part of the World Wide Web. It is easily located in your current browser's address bar. If you were not ...