• Timing – A Hackers Greatest Weapon

    Timing – A Hackers Greatest Weapon

    If you ever have the opportunity to talk to someone in charge of security at a maximum penitentiary, they will tell you the same thing. The prisoners have all the time in the world. All the time to watch and observe, looking for vulnerabilities within the patterned behaviors of the guards and penitentiary staff. They…

  • How SSO can lead to a Pass-The-Hash Attacks

    How SSO can lead to a Pass-The-Hash Attacks

    Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…

  • Reverse Proxies Are Killing Your MFA

    Reverse Proxies Are Killing Your MFA

    If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…

  • Cybersecurity Awareness Month – CYREBRO’s Awareness Insights

    Cybersecurity Awareness Month – CYREBRO’s Awareness Insights

    In many fields, including cybersecurity, common wisdom does not always translate into common practice. The majority of the data breaches that have occurred in recent years are not the result of the failure of some cutting-edge artificial intelligence firewall or of the discovery of a critical zero-day exploit. In most cases, a data breach is…

  • Double Extortion – Where We Are Now 

    Double Extortion – Where We Are Now 

    In 2019, the Maze ransomware organization was the first to use double extortion assaults. Since then, a growing number of ransomware gangs have embraced this tactic. Research published in 2021 by Group-IB says that the number of firms that have had their data exposed on a data breach site has increased by 935%, demonstrating that…

  • Phishing with GIFShell in Microsoft Teams

    Phishing with GIFShell in Microsoft Teams

    People love GIFs. We add them to emails, texts, tweets, and Slack chat groups all day long as we chat away with co-workers, friends, and family. We use them as a communication tool to show emotion and convey a tone when a plain text message might fall flat. If a picture says a thousand words,…

Loading

Sign Up for Updates