Author: Katherine Waszkiewicz

  • Defending the Edge Podcast, Episode 21: Unveiling the Mask, The Many Faces of Hacking  

    Defending the Edge Podcast, Episode 21: Unveiling the Mask, The Many Faces of Hacking  
    ,

    Red hat, blue hat, grey hat, black hat; follow along as we dive into the world of hackers on episode 21 of the Defending the Edge Podcast with DefendEdge set to be released tomorrow, August 6th. Uncover the different veils that make up ethical hackers, state-sponsored hackers, and the many other hats they wear. Topics… Read more

  • Emerging Threat Review: Storm-0324 & Sangria Tempest 

    Emerging Threat Review: Storm-0324 & Sangria Tempest 

    The newest set of tactics, techniques, and procedures (TTPs) from Storm-0324, otherwise known as DEV-0324, reveals their use of Microsoft Teams to deliver malware through phishing messages and attachments. With corporate networks within their reach, this new evolution raises concerns for companies utilizing Microsoft Teams for day-to-day communications.   Analysis: A publicly available Python-based tool known as… Read more

  • DISGOMOJI: Not A Dance Move 

    DISGOMOJI: Not A Dance Move 

    A sophisticated malware targeting Linux servers with emojis as the form of execution, DISGOMOJI has emerged attributed to none other than the threat actor UTA0137. Utilized as part of a cyber-espionage campaign by the Pakistan-based actor, follow along as we dive into what exactly emojis have to do with Linux servers and how these state… Read more

  • Shadow AI vs. Shadow IT

    Within the corridors of modern enterprises, a lesser-known dichotomy lurks in the shadows: the juxtaposition of Shadow Artificial Intelligence (AI) and Shadow Information Technology (IT). These clandestine counterparts represent both the promise and peril of technological autonomy, each possessing the potential to revolutionize workflows or disrupt established protocols. Follow along as we illuminate the path… Read more

  • Guarding Against Android Cyber Threats  

    When thinking about security measures to fight against malicious activity, rarely do people consider cellular security on the same level as network security. Social engineering techniques used by threat actors including phishing, vishing, and smishing should not be the end of where protection for mobile devices stops at. Identity theft and other types of exploits… Read more