Category : Security Operations

Open Source IntelligenceSocial EngineeringSecurity Operations

Protecting Your Brand from Domain Impersonation Attacks

Justin
Your website is an extension of your business, and your domain name represents that online presence by providing your visitors with an easy way to connect with your business whenever they want. Domain impersonation attacks have been around for a...
Security OperationsOpen Source Intelligence

An Introduction To Automating Open Source Intelligence Gathering Using Spiderfoot

Justin
SpiderFoot is a Open Source Intelligence (OSINT) tool that combines the power of many Internet API’s to gather intelligence on Names, E-mail Addresses, Domains, IP Addresses, and more.  This article will help you get setup with a local installation of...
Artificial IntelligenceMachine LearningSecurity Operations

Artificial Intelligence – Limitations, Attack Vectors, and Threat Modeling

Justin
Every couple of years a new or evolving technology bring about a whole new set of buzzwords that are often misunderstood by the general public. First, we saw the advent of the “cloud”, which is still not very well understood...
Third Party Risk ManagementSecurity OperationsIn The News

Supply Chain Attacks Explained

Justin
With the recent news of 3CX supply chain attacks I think it’s important to understand what, exactly, a supply chain attack is, and how you and/or your organization can help to reduce the risk and impact of a supply chain...

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More