How phishers deliver Qakbot malware through OneNote file attachmentsIntroductionFeb 9, 2023Feb 9, 2023
3 Effective Detection Use Cases for Identifying and Mitigating ThreatsIn today’s digital landscape, where the number, speed and sophistication of cyber threats are constantly increasing, security teams must be…Dec 18, 2022Dec 18, 2022
Impersonation Email Scams on the Rise: How to Protect Your BusinessInternal impersonation or funds transfer fraud (FTF), is a type of email scam where the threat actor poses as someone else within the…Dec 14, 2022Dec 14, 2022
Investigating Credential Harvesting HTML Attachments (HTML Smuggling)The 2022 State of the Phish report by Proofpoint found that a significant proportion of working adults surveyed had a false sense of…Dec 8, 2022Dec 8, 2022
Malware Traffic Analysis — Burnincandle WalkthroughThis is a walkthrough for the Malware Traffic Analysis packet capture exercise called BURNINCANDLE. The exercise requires the use of…May 30, 2022May 30, 2022
Analyzing Dridex malware network trafficBrad Duncan, who runs the website Malware-Traffic-Analysis.net, posted a new packet capture, which you can find here. This is a great…Aug 18, 2021Aug 18, 2021
What is a DMZ, and why is it important?A DMZ, or De-Militarized Zone, is a term originally coined by the military. Wikipedia defines a DMZ as:Aug 3, 2021Aug 3, 2021
Hashing & Integrity — The “I” in the CIA TriadIn cybersecurity, there is a concept known as the CIA Triad — Confidentiality, Integrity, Availability:Jul 18, 2021Jul 18, 2021
Imposter syndrome and social mediaOne dictionary defines imposter syndrome as:Jun 16, 2021Jun 16, 2021