top of page


Sep 9, 2022
Destructive cyber attacks - the "new normal"
A quick roundup of recent prominent attacks illustrates the current intensity of malicious activity but also the success of ransomware.


Sep 7, 2022
Ransomware operators expand the attack surface to Linux and beyond
Expanding to Linux, Vmware and the cloud infrastructure gives more opportunities for ransomware attacks.


Sep 6, 2022
Software supply chain concern on the rise
Strong digitalization and adoption of cloud platforms following the pandemic has many worried about the risks of software supply chain.


Sep 4, 2022
Are you checking stale user accounts in Active Directory?
Stale or inactive Active Directory accounts are a source of risk that increases over time. Check them regularly and automatically.


Sep 1, 2022
Data exfiltration in the public cloud
The risk of data exposure is a big challenge with the rising number and complexity of IaaS/PaaS services in the public cloud.


Sep 1, 2022
Russian hacker group hijacks ADFS authentication process
Microsoft documents a novel authentication bypass technique used by russian Cozy Bear threat actor group.


Aug 31, 2022
Regulating cyber security and privacy - not so easy
With destructive cyber attacks at an all time high, pressures for regulation are following suit. But don't expect too much.


Aug 30, 2022
Malicious data exfiltration using AWS S3 Replication Service
Implications for threat hunters: update of replication rules is a clue that data exfiltration may silently be occurring in the environment.


Aug 28, 2022
Phishing URLs increasingly hosted on SaaS platforms
Legitimate SaaS platforms are increasingly used for phishing links distribution, a relatively novel evasion technique.
bottom of page