ReliaQuest
ReliaQuest: Watch Out for Info-Stealers and RATs
ReliaQuest ranked LummaC2 and SocGholish among the top malware seen in Q2 and rounded out the top five list with AsyncRat, Oyster, and the growing numbers of info-stealers that were built using ...
Security Boulevard
AI and Automation: A Double-Edged Sword in Cybersecurity
Tony Bradley | | AI, Artificial Intelligence, Automation, bec, Blog, generative AI, Phishing, ReliaQuest
In recent years, the landscape of cybersecurity has undergone significant transformation, particularly with the adoption of artificial intelligence (AI) and automation by both defenders and attackers. The ReliaQuest Annual Cyber-Threat Report: 2024 ...
Introduction to Living Off the Land (LotL) Attacks
Living off the Land (LotL) attacks represent a sophisticated cyber threat strategy where attackers use legitimate tools and processes, known as LOLBins (Living Off the Land Binaries), to execute malicious activities. This ...
The Escalating Threat of Exposed Credentials
Tony Bradley | | Authentication, Blog, exposed credentials, Identity Theft, passwords, ReliaQuest, Security Awareness, threat detection
The menace posed by exposed credentials has surged alarmingly in recent years. In 2023 alone, over 6 billion new compromised credentials surfaced on both clear and dark web forums, escalating the cumulative ...
Navigating the Rising Tide of Phishing and BEC Threats
Phishing and Business Email Compromise (BEC) attacks are not just prevalent but are growing more sophisticated. Businesses worldwide are grappling with these challenges, facing advanced threats that bypass traditional security measures. The ...
Techstrong TV: Addressing Cybersecurity Tool Sprawl
The Great Resignation is adding strain on the already tight security industry labor shortage. In turn, it’s leaving companies vulnerable with limited bandwidth, even more burnt out teams and tool sprawl – ...
Security Boulevard