Select Page
Time to Discovery is a Security Pain Point

Time to Discovery is a Security Pain Point

A recent article on Dark Reading website discussing the amount of time it takes to discover, contain, and report breaches caught our attention. It cited four reports, two indicating a different amount of time from compromise to discovery for data breaches, one...
Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising Bypasses Security with Straight to Browser Attacks

Malvertising has recently made headlines thanks in part to a large Easter attack by the eGobbler gang that struck in early April and primarily focused on U.S. and European countries. The eGobbler gang has a history of launching attacks just prior to major holidays....
4 Phishing Attack Techniques that Bypass or Defeat 2FA

4 Phishing Attack Techniques that Bypass or Defeat 2FA

Earlier this year, we posted a blog on Two-Factor Authentication (2FA). In it, we shared that while 2FA is certainly a best practice for corporate network security, it mainly protects against phishing attacks aimed at credential stealing, and just like the best...