Playing with Relayed Credentials

During penetration testing exercises, the ability to make a victim connect to an attacker’s controlled host ...
Alberto Solino

Security in Plain English: What is a DDoS Attack? Part 2

  Last week we talked about what DDos attacks are and the lengths attackers go to to try and breach your ...
Mike Talon
Security in Plain English: What is a DDoS Attack?

Security in Plain English: What is a DDoS Attack?

Security in Plain English Series What is Two-Factor Authentication? Why Do I Have to Change my Password Every ...
Mike Talon

Phish-Proof Users: Stop Attackers with Stolen Credentials and Ways Past 2FA

Humans are often literally the weakest link. Cybercriminals have increasingly targeted users as a preferred attack ...
Damon Tepe

Security in Plain English: How does Anti-Malware Work?

This week's user-submitted question: "My company has made anti-virus software mandatory on all machines, including ...
Mike Talon
Security in Plain English: What are Red, Blue, and Purple Teams?

Security in Plain English: What are Red, Blue, and Purple Teams?

Security in Plain English Series What is Two-Factor Authentication? Why Do I Have to Change my Password Every ...
Mike Talon

Never Miss a Beat
Subscribe to Our Blog