We have all been there! I was carefully applying the sugar frosting onto the mouth-watering blueberry cheesecake to offer it a creamy texture. It was the result of organizing best tips from a minimum of ten recipes on YouTube, when suddenly I heard a yell- “Mom!” I left everything as is (leading to extra frosting […]

DLL planting, also known as DLL side loading, is a popular attack technique today. If we take a look at the list of advisories Microsoft has recently published, it is clear that a large number of vulnerabilities encompass DLL planting. We have seen many targeted attacks that abuse Windows OLE in many ways. At BlackHat USA 2015, an […]

Every year Verizon releases their Data Breach Investigations Report (DBIR), sharing a wealth of information about incidents throughout the year.  Verizon compiles this report with information from 70 organizations (including Intel Security), analyzing almost 80,000 individual incidents, over 2000 confirmed data breaches across 61 countries.  For professionals in the security industry, this information is invaluable […]

Microsoft Windows has hidden an Easter Egg since Windows Vista. It allows users to create a specially named folder that acts as a shortcut to Windows settings and special folders, such as control panels, My Computer, or the printers folder. This “God Mode” can come in handy for admins, but attackers are now using this undocumented feature for evil […]

It is important but difficult to stay current with relevant issues in our industry. Cybersecurity is furiously changing, fast in pace, and rising in global importance. Professionals must keep abreast not only with what is happening today, but also with what is emerging on the horizon and heading our direction. Security becomes stronger when professionals collectively explore […]