Category Archives: GENERAL

Zero-Hour Multi Brand Phish

April 16, 2016     No Comments on Zero-Hour Multi Brand Phish     ,      admin

Popular global brands like Yahoo, Gmail, Microsoft, and DropBox are commonly used for Credential Phishing attacks. Typically the attacker creates a replica of the brand’s Sign-in or Password recovery page and attempts to lure victims into entering their confidential information into the fake page. Today, at a large customer site, we witnessed…

Yahoo Email Phishing through Data URI

Hackers have come up with new and innovative way to perform credential phishing attacks. Typical credential phishing is done by creating look-a-like web pages hosted on compromised web servers or servers owned by the attacker himself. The problem for an attacker is that eventually signature based technologies catch up and black list…

Cognitive Thinking

February 27, 2016     No Comments on Cognitive Thinking          admin

Corporations have invested billions of dollars in “next gen” security devices built by some of the best minds in software today; but still, a handful of cyber threat actors – some of which have no college education – continue to hack their way into all types of organizations. The math…

Walls are not enough

February 23, 2016     No Comments on Walls are not enough          admin

Before the advent of gunpowder, castle or city walls were the primary means of defense.  The taller and thicker the wall, the longer a city or castle could stand against a siege.  The enemy eventually lost due to attrition.  Disease, starvation, and desertion reduced the enemy’s numbers until the threat…