Jacob StickneyHow phishers deliver Qakbot malware through OneNote file attachmentsIntroductionFeb 9, 2023Feb 9, 2023
Jacob Stickney3 Effective Detection Use Cases for Identifying and Mitigating ThreatsIn today’s digital landscape, where the number, speed and sophistication of cyber threats are constantly increasing, security teams must be…Dec 18, 2022Dec 18, 2022
Jacob StickneyImpersonation Email Scams on the Rise: How to Protect Your BusinessInternal impersonation or funds transfer fraud (FTF), is a type of email scam where the threat actor poses as someone else within the…Dec 14, 2022Dec 14, 2022
Jacob StickneyInvestigating Credential Harvesting HTML Attachments (HTML Smuggling)The 2022 State of the Phish report by Proofpoint found that a significant proportion of working adults surveyed had a false sense of…Dec 8, 2022Dec 8, 2022
Jacob StickneyMalware Traffic Analysis — Burnincandle WalkthroughThis is a walkthrough for the Malware Traffic Analysis packet capture exercise called BURNINCANDLE. The exercise requires the use of…May 30, 2022May 30, 2022
Jacob StickneyAnalyzing Dridex malware network trafficBrad Duncan, who runs the website Malware-Traffic-Analysis.net, posted a new packet capture, which you can find here. This is a great…Aug 18, 2021Aug 18, 2021
Jacob StickneyWhat is a DMZ, and why is it important?A DMZ, or De-Militarized Zone, is a term originally coined by the military. Wikipedia defines a DMZ as:Aug 3, 2021Aug 3, 2021
Jacob StickneyHashing & Integrity — The “I” in the CIA TriadIn cybersecurity, there is a concept known as the CIA Triad — Confidentiality, Integrity, Availability:Jul 18, 2021Jul 18, 2021
Jacob StickneyImposter syndrome and social mediaOne dictionary defines imposter syndrome as:Jun 16, 2021Jun 16, 2021