Get a demo

Malvertising and Google Ads: Protecting High Net-Worth Individuals and Executives

Do you use Google’s Search functionality to find products or services to solve a problem you have? I’m guessing that the majority of people reading this article do this regularly or have ...
infostealer RATs Reliaquest

ReliaQuest: Watch Out for Info-Stealers and RATs

ReliaQuest ranked LummaC2 and SocGholish among the top malware seen in Q2 and rounded out the top five list with AsyncRat, Oyster, and the growing numbers of info-stealers that were built using ...
Security Boulevard
human, error, open source security

Human Error – An Overlooked Aspect of Cyber Risk

Recent research shows that human error can account for 95% of all cybersecurity incidents. What’s more shocking is that only one-third of all companies offer cybersecurity awareness training for their employees ...
Security Boulevard

Rat Traps: Emulating AsyncRAT with AttackIQ Flex

In the ultramodern, mercurial sphere of cybersecurity, somehow a 1700-year-old quote from Helena of Constantinople still deeply resonates. Even with seemingly robust defenses, the smallest vulnerability can be an open invitation for ...

Living-Off-Trusted-Sites (LOTS) or should we say services?

"Living Off-Trusted Sites (LOTS)" is not a new cybercrime tactic, but it continues to pose a significant threat. Join us as we explore the evolution of LOTS, its impact on online trust ...
CISA Issues Warning

CISA Issues Warning: CrowdStrike Outage May Lead to Phishing and Malware Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding the recent CrowdStrike outage, warning that malicious actors are actively exploiting the situation to conduct phishing and other cyber ...

Dangling DNS and the dangers of subdomain hijacking

DNS attacks are becoming increasingly prevalent, with 90% of organizations experiencing them, as per the IDC Threat Intelligence Report 2023. Due to its critical function, DNS is a frequent target for cybercrimes, ...
twin, fraud, Google AI cybersecurity Wiz

Report Identifies More Than 250 Evil Twin Mobile Applications

The Satori Threat Intelligence Team funded by HUMAN Security, a provider of a platform thwarting bot-based attacks, today disclosed it has uncovered a massive ad fraud operation involving the setting up of ...
Security Boulevard
“Consider the Macro Perspective” — The Persistence of Macro-based Malware

“Consider the Macro Perspective” — The Persistence of Macro-based Malware

“Consider the Macro Perspective” — The Persistence of Macro-based MalwareUse SquareX to put an end to their three-decade streakOffice documents, encompassing a range of formats such as Word, Excel, and PowerPoint, have become deeply ...
“2024” neon sign

Biggest Ever Password Leak — but is ObamaCare’s RockYou2024 Really NEW?

Credential crunch: Ten billion plain-text passwords in a file—sky falling or situation normal? ...
Security Boulevard

Application Security Check Up