Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

Okta Hacked Again, Quishing Is The New Phishing, Google Play Protect Real-Time Scanning

In this episode, we explore the recent Okta breach where hackers obtained sensitive customer data via unauthorized access to the Okta support system. Next, we discuss the emerging threat of “quishing,” a ...
email, secure, LastPass WithSecure language Expel BEC Delivering Email Post-Data Breach

The Crucial Difference Between Pre- and Post-Delivery Email Scanning

Some major cybersecurity vendors are demonstrating significant flaws because their solutions don’t filter emails until after they reach the Exchange server ...
Security Boulevard
ASM, CTI,

6 Ways to Vet Your Next ASM Vendor

Attack surface management (ASM) is a critical security function, and the market for ASM solutions is growing rapidly. However, with the evolution to ASM 2.0, the process of selecting a new ASM ...
Security Boulevard
Fingerprintx Tool: An Internship Project for the Real World

Fingerprintx Tool: An Internship Project for the Real World

Introduction Port fingerprinting can detect specific services running on a network, which makes it useful during penetration tests. It expands visibility into potential attack surfaces and vulnerabilities within the network environment. Over ...
CISA JCDC Announcement, Apple's Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA JCDC Announcement, Apple’s Child Abuse Image Scanning, Amazon Pays You for Your Biometric Data

CISA announces the new Joint Cyber Defense Collaborative (JCDC), the controversy over Apple scanning devices for child sexual abuse material, and Amazon offers you a $10 credit if you enroll your biometric ...

Container Adoption Introduces Efficiency – and Vulnerabilities

The post Container Adoption Introduces Efficiency – and Vulnerabilities appeared first on Digital Defense, Inc ...

More Than a Scan: Vulnerability Management Provides Vital Context and Direction

The post More Than a Scan: Vulnerability Management Provides Vital Context and Direction appeared first on Digital Defense, Inc ...
Professionally Evil Fundamentals: Introduction

Converting NMAP XML Files to HTML with xsltproc

NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit.  This enables the scan data to be parsed by other tools ...
Professionally Evil Fundamentals: Introduction

Converting NMAP XML Files to HTML with xsltproc

NMAP is a wonderful network scanner and its ability to log scan data to files, specifically XML, helps quite a bit.  This enables the scan data to be parsed by other tools ...

Application Security Check Up