Account takeover is a form of identity theft and fraud, where a malicious third party successfully gains access to a user’s account credentials. A successful […]
CVEs Aiding Initial Access for Ransomware Gangs – Microsoft Office
Microsoft Office CVEs 2017-0199, 2017-11882, 2021-40444 In this write up we explore briefly the following Microsoft CVEs – CVE 2017-0199, CVE 2017-11882, and CVE 2021-40444 […]
New Version of ISO 27001: What this means for Organizations
ISO 27001:2021 The ISO 27001:2013 is about to be replaced by an updated and improved version. This version will introduce new categories and controls for […]
How Deception Technology Adds Value To Security Operations.
Deception technology is a cybersecurity defense practice that aims to deceive attackers by distributing a collection of traps and decoys across a system’s infrastructure to […]
Proactive Defense Against Business Email Compromise (BEC)
What is Business Email Compromise Business Email Compromise (BEC) is a type of attack in which the attacker poses as a trusted entity typically a […]
The QR Code Attack Vector
QR stands for “Quick Response” and QR codes are square-shaped machine-readable data formats that are useful for anything that needs to be scanned automatically. Before […]