• The Risks of Poor Patch Management

    The Risks of Poor Patch Management

    We all neglect things we know we shouldn’t, like a yearly physical with a healthcare provider. When the time rolls around, you tell yourself you’ll make an appointment when you’re less busy, that you feel fine so there’s no need, or concoct another story that lets you put off what you know you shouldn’t. While…

  • Log4j Is Still Causing Havoc: What We Learned From Log4Shell

    Log4j Is Still Causing Havoc: What We Learned From Log4Shell

    If you knew you were at risk for diabetes or cancer, you’d take all the necessary precautions to avoid or delay onset. You’d go for routine checkups and tests to ensure that if signs of the disease appear, you could catch it early, treat it, and hopefully avoid a deadly outcome. A company’s cybersecurity health…

  • How SSO can lead to a Pass-The-Hash Attacks

    How SSO can lead to a Pass-The-Hash Attacks

    Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…

  • Reverse Proxies Are Killing Your MFA

    Reverse Proxies Are Killing Your MFA

    If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…

  • Phishing with GIFShell in Microsoft Teams

    Phishing with GIFShell in Microsoft Teams

    People love GIFs. We add them to emails, texts, tweets, and Slack chat groups all day long as we chat away with co-workers, friends, and family. We use them as a communication tool to show emotion and convey a tone when a plain text message might fall flat. If a picture says a thousand words,…

  • Hackers scan for CVEs in 15 minutes (or your pizza is free)

    Hackers scan for CVEs in 15 minutes (or your pizza is free)

    Car parking lots notoriously attract thieves. With plenty of cars lined up next to each other, all a thief has to do is scan the vehicles as he walks up and down the rows, looking for an open window, a door left ajar, or expensive items left out in plain view. It’s almost too easy,…

Loading

Sign Up for Updates