Featured Blog
Connected App, Connected Risk: Lessons from the Salesforce–Drift Breach
One weak app integration exposed some of the world’s biggest companies — including Cloudflare, Palo Alto Networks, and Zscaler — to data theft. At first glance, this incident looked like yet another Salesforce or Google Workspace hack. Headlines shouted that billions of Gmail accounts were at risk. But that wasn’t the real story. The breach […]
Breaches, Cyberattacks, Cybersecurity, DDoS, Digital Forensics, General, IT, Network Forensics, Privacy, Tools, Vulnerabilities
RIP Office365 Magic Unicorn Tool
Breaches, Cybersecurity, Digital Forensics, Network Forensics, Tools
Exposing the Secret Office 365 Forensics Tool
Breaches, Cyberattacks, Cybersecurity, Malware, Ransomware
Cyber Alert: New Ransomware Holds Individual File Shares Hostage
Breaches, Cyberattacks, Cybersecurity, Network Forensics, Vulnerabilities
Manually Exploiting MS17-010
Cybersecurity, Digital Forensics, Malware, Ransomware, Vulnerabilities
How To Search for Strings on a Disk Image Using The Sleuth Kit
Cyberattacks, Cybersecurity, IoT, IT, Network Forensics
How to Get Started with DIY Home Network Monitoring
Cyberattacks, IT, Vulnerabilities
Top 3 Ways to Protect Yourself Following Spectre and Meltdown Revelations
Compliance, Cybersecurity, IoT, IT, Password, Vulnerabilities
Top 5 Ways IT Managers Can Thwart Hackers
Breaches, Cyberattacks, Cybersecurity, IT, Malware, Password, Privacy