
How To Preemptively Track Phishing Campaigns
Posted by AngelaWong, 10-08-2020Understanding vulnerabilities and the threat matrix to your enterprise was always an effective way to ensure cogent cyber defense of your organization. Reacting to phishing attacks in real-tim...

Incident Of The Week: Russia Utilizes Hacking 101 Strategies Toward Government And Energy Sector Targets
Posted by AngelaWong, 10-08-2020Records Exposed: Undisclosed | Industry: Government and Energy | Type Of Attack: Spear Phishing, Malware, Brute Force, Zero-Day] The Russian Hacker group Fancy Bear poses an o...

Researcher Finds New Office Macro Attacks for MacOS
Posted by AngelaWong, 09-08-2020Building successful macro attacks means getting past several layers of security, but a Black Hat speaker found a way through. Microsoft Office is no stranger to vulnerabilities and exploits. ...

Researchers Revive 'Foreshadow' Attack by Extending It Beyond L1 Cache
Posted by AngelaWong, 09-08-2020Researchers revealed late on Thursday that the mitigations and patches rolled out in 2018 for the Foreshadow vulnerabilities affecting Intel processors can fail to prevent attacks. Foreshadow, also k...

How Traditional Machine Learning Is Holding Cybersecurity Back
Posted by AngelaWong, 04-08-2020While global cybersecurity spending now surpasses $100 billion annually, 64 percent of enterprises were compromised in 2018, according to a study by the Ponemon Institute. Wh...

Google: Eleven zero-days detected in the wild in the first half of 2020
Posted by AngelaWong, 03-08-2020According to data collected by Google's Project Zero security team, there have been 11 zero-day vulnerabilities exploited in the wild in the first half of the year. The current number puts 2020 on tr...