Jacob StickneyHow phishers deliver Qakbot malware through OneNote file attachmentsIntroduction4 min read·Feb 9, 2023----
Jacob Stickney3 Effective Detection Use Cases for Identifying and Mitigating ThreatsIn today’s digital landscape, where the number, speed and sophistication of cyber threats are constantly increasing, security teams must be…4 min read·Dec 18, 2022----
Jacob StickneyImpersonation Email Scams on the Rise: How to Protect Your BusinessInternal impersonation or funds transfer fraud (FTF), is a type of email scam where the threat actor poses as someone else within the…3 min read·Dec 14, 2022----
Jacob StickneyInvestigating Credential Harvesting HTML Attachments (HTML Smuggling)The 2022 State of the Phish report by Proofpoint found that a significant proportion of working adults surveyed had a false sense of…6 min read·Dec 8, 2022----
Jacob StickneyMalware Traffic Analysis — Burnincandle WalkthroughThis is a walkthrough for the Malware Traffic Analysis packet capture exercise called BURNINCANDLE. The exercise requires the use of…3 min read·May 30, 2022----
Jacob StickneyAnalyzing Dridex malware network trafficBrad Duncan, who runs the website Malware-Traffic-Analysis.net, posted a new packet capture, which you can find here. This is a great…6 min read·Aug 18, 2021----
Jacob StickneyWhat is a DMZ, and why is it important?A DMZ, or De-Militarized Zone, is a term originally coined by the military. Wikipedia defines a DMZ as:3 min read·Aug 3, 2021----
Jacob StickneyHashing & Integrity — The “I” in the CIA TriadIn cybersecurity, there is a concept known as the CIA Triad — Confidentiality, Integrity, Availability:4 min read·Jul 18, 2021----
Jacob StickneyImposter syndrome and social mediaOne dictionary defines imposter syndrome as:3 min read·Jun 16, 2021----