Tag: Exploitation
-
Beware of the Toll Lane Fee Text Scam
In an increasingly digital world, scams are becoming more sophisticated and challenging to identify. From Postal Service smishing attacks to IT helpdesk vishing attacks, it has been nearly impossible to keep track of what is real and what is indeed falsified. As the start of the year unfolds, threat actors have rotated slightly to target… Read more
-
Forti-What Now? Breaches And How They Effect You
Recently, there has been a new wave of cyber-attacks that have caused quite a stir. From sextortion scams to social security breaches, there has been an insurmountable amount of new cybersecurity threats emerging every single day. Such activity can be very disheartening to those paying attention and can rear its ugly head in more ways… Read more
-
Predator Spyware: The Silent Stalker in The Digital Jungle
What is Predator? Could you imagine your phone, the device on which you keep all your sensitive data, have private conversations, and always keep on your person, has betrayed you? No clicks, weird downloads, not even an alert, and no mistakes on your part. Behind the scenes, a sneaky piece of software called spyware lurks… Read more
-
The Connection Between Cobalt Sapling, Moses Staff, and Abraham’s Ax
Iranian-connected advanced persistent threat (APT) Cobalt Sapling was discovered in September of 2021, but evidence of their activity suggests being active since November of 2020. This hacktivist is known for anti-Israel sentiment, data extortion and encryption attacks and propaganda material among other things. Their motives appear to be solely political, as they never demand ransom… Read more
-
Demystifying SQL Injection and Database Security
Structured Query Language or SQL is a programming language designed for creating, manipulating, and processing information stored in a relational database. These are made up of tables where information is stored and accessed using rows and columns to represent different data attributes and relationships. These databases are ubiquitous; even though we, the users, may not interact… Read more
-
Safeguarding Your Digital Gateways and APIs
Application Programming Interfaces or APIs are the mechanisms by which different software and applications can communicate with one another. APIs are a core component of the web-based applications that power our world today. They can be found in everything from weather apps to healthcare technologies to every smart device on the market. For as many… Read more
-
Preview Pane Attacks
In today’s digital landscape, cybersecurity threats are evolving rapidly, and one of the more insidious methods attackers use to infiltrate systems is through preview pane attacks. These attacks leverage vulnerabilities in software that display previews of content, such as emails or documents, without fully opening them. In this blog post, we’ll delve into preview pane… Read more
-
Guarding Against Android Cyber Threats
When thinking about security measures to fight against malicious activity, rarely do people consider cellular security on the same level as network security. Social engineering techniques used by threat actors including phishing, vishing, and smishing should not be the end of where protection for mobile devices stops at. Identity theft and other types of exploits… Read more
-
The Community That Spawned Notorious Threat Actors
Some might wonder where threat actors get their origin, where do they learn their expertise? The ‘Community’ also referred to as ‘The Com’ or ‘The Comm’ is an online presence filled with individuals from diverse backgrounds including gamers, hackers, and recreational users. More than hundreds of individuals take part in various activities from innocent meme-sharing… Read more