Simulating Lateral Attacks Through Email

A skilled attacker can get inside your company by abusing common email applications. Here are three strategies to block them. A big portion of breaching an organization’s infrastructure involves challenging normal procedures and processes. A red team’s main purpose is to simulate adversary activities and help the security administrators understand, monitor, and remediate the threats. […]

Read more
Cyber Security Today: Jan. 16, 2019 — Why security testing is vital, and keep away from construction sites

Why security testing is vital before releasing products, Nova Scotia privacy commissioner critical of the government, and keep away from construction sites It often doesn’t take much effort for hackers to successfully do their jobs. Simple mistakes by companies make it easy. The news site TechCrunch this week carried a prime example. A security researcher said […]

Read more
Hijacking a PLC Using its Own Network Features

Researcher at S4x19 to show how attackers can exploit the built-in advanced connectivity functions in some Rockwell PLCs. S4x19 — Miami — Programmable logic controllers (PLCs) have been long known to be easy marks for attack due to their blatant lack of built-in security, but a security researcher here this week at S4x19 will demonstrate how […]

Read more
Children’s Charity or CryptoMix? Details on This Ransomware Scam

As ransomware threats become more sophisticated, the tactics cybercriminals use to coerce payments from users become more targeted as well. And now, a stealthy strain is using deceptive techniques to mask its malicious identity. Meet CryptoMix ransomware, a strain that disguises itself as a children’s charity in order to trick users into thinking they’re making […]

Read more
Top