As digital transformation picks up speed, the amount of sensitive patient information being created and stored is growing rapidly. But many healthcare organizations are struggling […]
Artificial Intelligence is spreading its influence far and wide, impacting nearly every aspect of our lives, including cybersecurity. But let’s face it- AI isn’t flawless. […]
The convergence of advanced AI with social engineering has created what I call the perfect storm – a transformation so profound that it’s rewriting the […]
Introduction Phishing is a ray of light when every attempt to breach an organization fails. However, setting up a covert SMTP infrastructure for phishing is […]
If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks tend to use Metasploit combined […]
[[Post was originally posted on 23rd May, 2017 at invadersam.com]] Microsoft Office Word / Wordpad remote code execution vulnerability allows a remote attacker to execute […]
Introduction When an attacker compromises an end-point system in an organization, he needs some sort of confirmation that: his code was executed on the targeted […]