
Blox Tales #11: Netflix Credential Phishing
Posted by AngelaWong, 29-07-2020Each Blox Tale will take a look at a targeted email attack, outline why it made its way into an inbox, and highlight how Armorblox was able to detect the attack. In this blog, we’ll focus on a c...

Ensiko: A Webshell With Ransomware Capabilities
Posted by AngelaWong, 29-07-2020Ensiko is a PHP web shell with ransomware capabilities that targets various platforms such as Linux, Windows, macOS, or any other platform that has PHP installed. The malware has the capability to rem...

Cohesity Named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions
Posted by , 24-07-2020Cohesity today announced that it has been named a Leader in the Gartner Magic Quadrant for Data Center Backup and Recovery Solutions. The company is positioned as a Leader in just its second time in t...

Cybersecurity Lessons from the Pandemic
Posted by AngelaWong, 23-07-2020How does cybersecurity support business and society? The pandemic shows us. There is absolutely no absolute security. Nature is designed in a way that things can and eventually will go wrong....

Chris Vickery: AI Will Drive Tomorrow’s Data Breaches
Posted by AngelaWong, 23-07-2020Chris Vickery talks about his craziest data breach discoveries and why “vishing” is the next top threat no one’s ready for. From malicious hacks to accidental misconfiguration...

BadPower attack corrupts fast chargers to melt or set your device on fire
Posted by AngelaWong, 20-07-2020Chinese security researchers said they can alter the firmware of fast chargers to cause damage to connected (charging) systems, such as melt components, or even set devices on fire. The technique, na...