threat intelligence
What is Threat Intelligence and why is it important?
Research & Threat Intel
In this article, we will define what threat intelligence is – and what it isn’t – by differentiating it from...
malware
CryptoAPI in Malware
Research & Threat Intel
For a considerable period, cryptography algorithms with varying levels of complexity have been detected in most malware families. Many have...
From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...
credentials theft.
Credential theft: the business impact of stolen credentials
Research & Threat Intel
Cybercriminals are stealing credentials using a wide range of techniques, tactics and procedures. The compromised data has a variety of...
From Local File Inclusion to Remote Code Execution –...
Application Security
Local File Inclusion - aka LFI - is one of the most common Web Application vulnerabilities. If conducted successfully, It...