September 27, 2019

Should I invest in attack simulation tools?

[ad_1] Breach and attack simulation, or BAS, tools help security administrators understand what their infrastructure looks like from an external perspective. Automated attack simulation tools are […]
September 5, 2019

How does AttackSurfaceMapper help with attack surface mapping?

[ad_1] The most important first step to reduce your organization’s attack surface is knowing what that attack surface actually looks like. You can’t reduce exposure to […]
August 20, 2019

KNOB attack puts all Bluetooth devices at risk

[ad_1] Researchers found a weakness in the Bluetooth standard that affects all Bluetooth devices and could lead to man-in-the-middle attacks. The researchers — Daniele Antonioli, a […]
July 10, 2019

How does an island hopping attack work?

[ad_1] Threat actors targeting large organizations — even ones with effective cybersecurity defenses — will go to any length to get in. Even when the targeted […]
June 13, 2019

New Rowhammer attack can steal data from memory

[ad_1] An international academic research team discovered a variant of the Rowhammer attack, called RAMBleed, that can be performed even if a system is patched against […]
(303) 647-4050