September 5, 2019

How does AttackSurfaceMapper help with attack surface mapping?

The most important first step to reduce your organization’s attack surface is knowing what that attack surface actually looks like. You can’t reduce exposure to something […]
August 20, 2019
10 of the biggest -- so far

KNOB attack puts all Bluetooth devices at risk

Researchers found a weakness in the Bluetooth standard that affects all Bluetooth devices and could lead to man-in-the-middle attacks. The researchers — Daniele Antonioli, a PhD […]
July 10, 2019

How does an island hopping attack work?

Threat actors targeting large organizations — even ones with effective cybersecurity defenses — will go to any length to get in. Even when the targeted organization […]
June 13, 2019

New Rowhammer attack can steal data from memory

An international academic research team discovered a variant of the Rowhammer attack, called RAMBleed, that can be performed even if a system is patched against Rowhammer. […]
(303) 647-4050