How Useful Is AI? It Depends On How Experienced You Are.
A new study on the effectiveness of AI in the workplace indicates a skill-leveling…
The Role of Cyber Hygiene in Protecting Data
A good cyber hygiene program will improve resilience to attacks, give more control over an…
New Multistage Adversary-In-The-Middle (AitM) Attacks
Multistage Adversary in the Middle attacks are on the rise. Here we take a look at the…
Meta’s Q1 2023 Adversarial Threat Report: What You Should Know
This May, Meta released its first quarter Adversarial Threat Report sharing insights into…
Stopping Online Fraud
Threat actors use many methods to infiltrate banks, financial institutions, and their…
Baselining Endpoint Risk
Baselining endpoints tells security professionals what risks exist and lets them develop a…
WormGPT and BlackMamba: AI-Generated Phishing And Malware Attacks
We spoke briefly to cyberthreat expert Elise Manna from Novacoast on the advent of…
The Reddit Controversy, Hacktivism, and the Pandora’s Box of Vigilantism
The breach of Reddit by the BlackCat ransomware group highlights the dangers associated with…
The Art of ATT&CK
MITRE ATT&CK has been heralded as an excellent resource for known TTPs, but how does one…
Living Off the Land Attacks: The Risks
Sometimes an attacker's most useful tools conveniently already exist on your endpoints, a…
Phishing Scams Using Chatbots to Capture Personal Information
Among the myriad creative phishing tactics employed by scammers, one of the latest (and most…
ChatGPT From A Pen Tester’s Point Of View
ChatGPT has significant potential to transform the landscape of penetration testing by…