Blogs

Blog Image

KRACK Attacks!

What’s the

Blog Image

Bluetooth Blues

The proliferation of wireless devices in the world is ast

Blog Image

Security Automation and Orchestration: An Analyst Perspective

Security Automation and Orchestration (SAO) Platforms are the newest players in the security landscape focusing on easing the burden of alert-fatigue.
Blog Image

The Devil’s in the Subtitles

Widespread malware affecting

Blog Image

WannaCry Recap

Friday could not have come sooner for some last week.

Blog Image

WannaCry? You Might.

Urgent Information Regarding WanaCrypt/WannaCry/WCry Ransom-ware Outbreak

Blog Image

Mitigating Against the Shadow Broker Exploit Dump


On Friday, April 14, a group called “

Blog Image

Hijacking the CEO’s Email Account

Why Security Teams Need a Second Set of Eyes

During a recent penetration test, I hijacked the client’s email server, posed as the client CEO, and sent a fraudulent email to the client CFO asking the CFO to wire $10,000 USD to an offshore bank account.

Blog Image

On the Reliance of Client-Side Security

I recently conducted a penetration test of a web application. Because of design decisions, I was able to bypass CAPTCHA to brute force user accounts and, ultimately, bypass file upload restrictions to upload malware onto the web server and into the internal network environment.