State of the dark web: Insights from the underground
The rise of professional criminal gangs, malware-as-a-service, and improved infrastructure for carrying out criminal activity are changing the dark web.
View Article5 ways hackers hide their tracks
From trusted pentesting tools to LOLBINs, attackers abuse trusted platforms and protocols to evade security controls.
View ArticleJava deserialisation vulnerabilities explained and how to defend against them
Java provides a means to conveniently serialise data to maintain its integrity as it's sent over a network.
View ArticleServer-side request forgery attacks explained and how to defend against them
SSRF attacks consist of an attacker tricking the server into making an unauthorised request. Defending against them can be relatively easy.
View ArticleSoftware composition analysis: how it identifies open source software risks
SCA tools give insight into open source software components and the vulnerabilities they have.
View ArticleWho's who in the cyber criminal underground
Cyber criminal groups are specialising as malware developers, initial access brokers, ransomware-as-a-service providers, data brokers, and other roles.
View Article
More Pages to Explore .....