Your MFA solution is unsafe (most likely)

Your MFA solution is unsafe (most likely)

SMS and One Time Passcodes Having any MFA is better than relying on passwords alone, but weak or poorly implemented MFA can still leave organizations vulnerable to attacks. Push and mobile-based one-time passcodes are becoming more and more vulnerable to attacks. With...

read more
Tool spotlight: YARA

Tool spotlight: YARA

In today's blog post, we will be going over a tool that is a must-have in every security analyst's arsenal. Even if you won't use it every day, it is helpful to understand what malware signatures look like in the background. YARA is a powerful pattern-matching tool...

read more
Tool Tip: How to create honey folders?

Tool Tip: How to create honey folders?

In today's blog post, we will be going over how to create honey folders with no additional tooling. Cyber Deception allows for the placement of traps with no business value, “normal” is defined as no interaction. Its value lies in being probed, attacked, or...

read more