DNS Search Suffix Wi-Fi Attacks (part two)

In this blog post, we will go into detail on how DNS search suffixes can be used maliciously to gather usernames and NTLM password hashes from unsuspecting victims connecting to a Wi-Fi network. In …
view article
  • Share

Codebreak Hotel (part one)

Last year we were faced with some unusual activity on two employees’ laptops, which ended up being benign, but revealed a strange default configuration on a public Wi-Fi hotspot they had connected t …
view article
  • Share

Detecting advanced threats in an age of sophisticated cybercrime

Businesses face an increasingly challenging task in detecting advanced security threats. In 2017 alone, Cryptojacking attacks exploded by 8,500%, software update supply chain attacks increased by 200% …
view article
  • Share

5 reasons to attend Northern CyberSecurity Summit 2019

A new year brings a new wave of enthusiasm for learning and personal development. There are few better ways to channel that interest than to meet with like-minded peers and explore the most challengin …
view article
  • Share

New report maps managed security to better inform buyers

Managed security has moved from the side-lines into the mainstream; from outsourced functions to a thriving business ecosystem, able to offer a huge range of solutions and services to businesses of al …
view article
  • Share

Preventing a Global Security Crisis: Why we need industry self-policing before the bubble bursts

“Our investment-strategy was simple. People hate to think about bad things happening so they always underestimate their likelihood - Charlie Geller, The Big Short. The above quote was one of man …
view article
  • Share

The TrickBot and MikroTik connection

In my professional capacity I perform several tasks. One task involves tracking and collecting indicators of compromise (IoC) used to identify malware campaigns. Another aspect of my work involves tra …
view article
  • Share

Can exposing vulnerabilities in your IT environment actually make you less attractive to attackers?

Cyber threats are like monsters under the bed. You can’t say for sure whether they’re really there or what they even look like, yet they still give you an uncomfortable feeling that they’ll cree …
view article
  • Share

Staying strong in the evolving threat landscape

In an age of ever-increasing technological complexity amid an evolving security threat landscape, it’s almost inevitable that more and more household names become the victims of cybercrime. As or …
view article
  • Share

How easy is it to hack corporate passwords?

Businesses, by their very nature, are attracted to standards. Predictable practices bring scale and efficiency to everyday work. While there are many areas of corporate work where predictability is a …
view article
  • Share