From QR to compromise: The growing “quishing” threat
Credit to Author: Andrew Brandt| Date: Wed, 16 Oct 2024 13:01:41 +0000
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
Read moreCredit to Author: Andrew Brandt| Date: Wed, 16 Oct 2024 13:01:41 +0000
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
Read moreCredit to Author: Paul Ducklin| Date: Thu, 06 Jul 2023 17:58:30 +0000
How to get all your corporate “Ops” teams working together, with cybersecurity correctness as a guiding light.
Read moreCredit to Author: Angela Gunn| Date: Wed, 11 Jan 2023 02:05:40 +0000
Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support
Read moreCredit to Author: Angela Gunn| Date: Tue, 13 Dec 2022 18:00:22 +0000
Windows-heavy collection closes out a year of elevation-of-privilege vulnerabilities; no Exchange patches in sight
Read moreCredit to Author: Andrew Brandt| Date: Tue, 13 Dec 2022 18:00:15 +0000
The criminals signed their AV-killer malware, closely related to one known as BURNTCIGAR, with a legitimate WHCP certificate
Read moreCredit to Author: Gabor Szappanos| Date: Thu, 03 Nov 2022 12:03:13 +0000
A threat actor’s repeated use of DLL-hijack execution flow makes for interesting attack results, including omnivorous file ingestion; we break down five cases and find commonalities
Read moreCredit to Author: Gabor Szappanos| Date: Thu, 03 Nov 2022 12:03:13 +0000
A threat actor’s repeated use of DLL-hijack execution flow makes for interesting attack results, including omnivorous file ingestion; we break down five cases and find commonalities
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Jul 2022 11:00:21 +0000
Looking ahead to the Security Operation Center of the future, forged from developments in XDR, AI innovation, and programmable security posture and powered by the AI-UX value circuit
Read more