Blog

Insights on Data Security & Threat Intelligence

Why Data Classification is Important?

Data classification enables organizations to recognize and protect their most sensitive and confidential information. This includes identifying data that, if accessed by unauthorized individuals could result in serious consequences, such as data breach, privacy violation, or financial loss.

Read More >

Understanding Data Classification

Data is essential for all organizations regardless of its size. Whether it’s customer information, financial records, intellectual property, or proprietary research, data plays a significant role in the development of business strategies and driving innovation. However, this valuable resource comes with various challenges.

Read More >

Analyzing behavior to protect against BEC attacks

Understanding “normal” behaviors in email exchanges are key to combating advanced phishing and BEC attacks by John Stevenson Detecting Business Email Compromise (BEC)  In the final part of our series of blogs on Business Email Compromise (BEC), it’s time to look at how AI, ML, and NLP all have a

Read More >

Using NLP techniques to protect against BEC attacks

How Natural Language Programming help combat phishing and BEC attacks by John Stevenson Business Email Compromise (BEC)  Business Email Compromise (BEC) covers a range of email attacks that typically share a common core attribute. There is no obvious executable component, such as a URL or file attachment in the message

Read More >

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the barcode was

Read More >

Abusing Remote Administration Tools

The bad, worse and the horrible  by Gunnar Guðmundsson and Axel Marinho Guðmundsson Introduction In this article, we look at a malware payload from an exploited Microsoft Word document. With a little Python scripting and deciphering we research a single sample and gather a few more versions to view a

Read More >