blog

Blog

PowerShell and Malicious O365 Email Rules

~ by Britton Manahan Introduction Everyday more and more companies are taking advantage of the benefits offered by cloud-based solutions. Security for these different cloud services is often misunderstood, and threat actors have taken notice. One of the most common cloud offerings is Office 365 (O36...

Beware of the Office 365 Compromise

There’s an old saying that a bad day fishing is better than a good day doing anything else. Many cyber thieves might agree that applies to phishing, as well, particularly if they put some extra effort into their endeavor.

Counter-Punching Anti-Debugging Methods with WinAppDbg and Python - Part 1

~ by Britton Manahan Introduction Advanced dynamic malware analysis through debugging can unlock invaluable insights into an unknown binary. However, sophisticated malware authors aren’t going to simply allow their programs to hand over their secrets to a debugger. Many of the anti-debugging techniq...

Are you Ready for GDPR?

The General Data Protection Regulation (GDPR) is a European Union regulation on data protection and privacy for all individuals within the EU’s 28-member countries. When it goes into effect on May 25, 2018, it will require companies that collect personal data on European Union citizens to comprehens...

The Axis of Hack-sis?

Recent events are bearing out the Worldwide Threat Assessment of the U.S. Intelligence Community, delivered to Congress in February by the Director of National Intelligence Dan Coats, which pointed a finger at Russia, Iran and North Korea as states that are using cyber operations as a low-cost tool ...

Crackin’ the KRACK Attack

Author: Matt Ahrens Published: 10/18/17

How to Avoid Wannacry

Author: Matt Ahrens Published: 05/13/17

Top Cybersecurity Trends to Watch in 2017…and How to Prepare

Author: Jason Rebholz Published: 01/10/17

A Black Friday Steal

Author: Jason Rebholz Published: 11/17/16