Select Page
Think Outside the Sandbox

Think Outside the Sandbox

Over the past decade, our industry has been plagued by a losing game of cat-and-mouse against street-smart hackers who continually find new ways to compromise Internet-connected devices. Enhanced security of modern browsers and automatic software updates are creating...

Zero-Hour Multi Brand Phish

Popular global brands like Yahoo, Gmail, Microsoft, and DropBox are commonly used for Credential Phishing attacks. Typically the attacker creates a replica of the brand’s Sign-in or Password recovery page and attempts to lure victims into entering their confidential...

Yahoo Email Phishing through Data URI

Hackers have come up with new and innovative way to perform credential phishing attacks. Typical credential phishing is done by creating look-a-like web pages hosted on compromised web servers or servers owned by the attacker himself. The problem for an attacker is...

Inside a Phishing Network

Credential Phishing is an effective way to snatch someone’s confidential information.  Hacker’s create a look-a-like login page matching a global brand’s login (Google, Yahoo, Microsoft) and send a phishing email containing a link to the fake page. When a victim...

Cognitive Thinking

Corporations have invested billions of dollars in “next gen” security devices built by some of the best minds in software today; but still, a handful of cyber threat actors – some of which have no college education – continue to hack their way into all types of...

Walls are not enough

Before the advent of gunpowder, castle or city walls were the primary means of defense. The taller and thicker the wall, the longer a city or castle could stand against a siege. The enemy eventually lost due to attrition. Disease, starvation, and desertion reduced the...