
Cutting Through the Hype and Preparing AI for Cybersecurity’s Biggest Challenges!
Artificial Intelligence is spreading its influence far and wide, impacting nearly every aspect of our lives, including cybersecurity. But let’s […]
Artificial Intelligence is spreading its influence far and wide, impacting nearly every aspect of our lives, including cybersecurity. But let’s […]
The convergence of advanced AI with social engineering has created what I call the perfect storm – a transformation so […]
Introduction Phishing is a ray of light when every attempt to breach an organization fails. However, setting up a covert […]
If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks […]
[[Post was originally posted on 23rd May, 2017 at invadersam.com]] Microsoft Office Word / Wordpad remote code execution vulnerability allows […]
Before we start to configure our decoys and put it in our production environment, let’s take a look at what […]
Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code […]
What is a Spear Phishing? Spear phishing is a deceptive communication technique in which a victim is lured via e-mail, […]
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number […]
Over the past few years, we have completed a number of social engineering tests as part of advanced penetration testing […]