-
How SSO can lead to a Pass-The-Hash Attacks
Apple AirTags. Google Maps. Single sign-on technology. What do these three seemingly random tech advancements have in common? Each was created to make our daily experiences more convenient, yet each has been exploited for evil purposes. Stalkers are using AirTags to track the whereabouts of unsuspecting victims; criminals are plotting attacks and burglaries using detailed…
-
Reverse Proxies Are Killing Your MFA
If you’re old enough to remember landlines (or have seen any 1980s or 90s movie about teens looking to put one over on their parents), chances are your parents pulled a real-world man-in-the-middle attack (MITM) on you. There you were as a sneaky teenager plotting with a friend over the phone about going to a…
-
Cybersecurity Awareness Month – CYREBRO’s Awareness Insights
In many fields, including cybersecurity, common wisdom does not always translate into common practice. The majority of the data breaches that have occurred in recent years are not the result of the failure of some cutting-edge artificial intelligence firewall or of the discovery of a critical zero-day exploit. In most cases, a data breach is…
-
Double Extortion – Where We Are Now
In 2019, the Maze ransomware organization was the first to use double extortion assaults. Since then, a growing number of ransomware gangs have embraced this tactic. Research published in 2021 by Group-IB says that the number of firms that have had their data exposed on a data breach site has increased by 935%, demonstrating that…
-
Phishing with GIFShell in Microsoft Teams
People love GIFs. We add them to emails, texts, tweets, and Slack chat groups all day long as we chat away with co-workers, friends, and family. We use them as a communication tool to show emotion and convey a tone when a plain text message might fall flat. If a picture says a thousand words,…
-
Hackers scan for CVEs in 15 minutes (or your pizza is free)
Car parking lots notoriously attract thieves. With plenty of cars lined up next to each other, all a thief has to do is scan the vehicles as he walks up and down the rows, looking for an open window, a door left ajar, or expensive items left out in plain view. It’s almost too easy,…