CSO Online | Aug 8, 2018 In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves...
Read moreCSO Online | Aug 8, 2018 In this episode, Steve Ragan shows what a hybrid phishing attack looks like as it starts off on one service, and quickly moves...
Read moreBreaking Down the PROPagate Code Injection Attack
August 8 2018What makes PROPagate unique is that it uses Windows APIs to take advantage of the way Windows subclasses its window events. Attackers have a new way to sneak malicious...
Read moreBreaking Down the PROPagate Code Injection Attack
August 8 2018What makes PROPagate unique is that it uses Windows APIs to take advantage of the way Windows subclasses its window events. Attackers have a new way to sneak malicious...
Read moreExpect API Breaches to Accelerate
August 8 2018APIs provide the digital glue that binds apps, cloud resources, app services and data all together – and they’re increasingly an appsec security threat. Last year the category of...
Read moreExpect API Breaches to Accelerate
August 8 2018APIs provide the digital glue that binds apps, cloud resources, app services and data all together – and they’re increasingly an appsec security threat. Last year the category of...
Read moreBIOS Boots What? Finding Evil in Boot Code at Scale!
August 8 2018The second issue is that reverse engineering all boot records is impractical. Given the job of determining if a single system is infected with a bootkit, a...
Read moreFlorida Man Arrested in SIM Swap Conspiracy
August 8 2018Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds...
Read moreFlorida Man Arrested in SIM Swap Conspiracy
August 8 2018Police in Florida have arrested a 25-year-old man accused of being part of a multi-state cyber fraud ring that hijacked mobile phone numbers in online attacks that siphoned hundreds...
Read moreEven ‘Regular Cybercriminals’ Are After ICS Networks
August 8 2018A Cybereason honeypot project shows that ordinary cybercriminals are also targeting weakly secured environments. Contrary to what some might perceive, state-backed groups and advanced persistent threat (APT) actors are...
Read more
Recent Comments