Search
Close this search box.

Blog

Insights on Data Security & Threat Intelligence

New Tricks of Macro Malware

In the past few months, we have noticed a rise in spam emails that have an attachment of “.DOC” extension filename but actually is a “.MHT” file. This trending trick seems to be a new way to spread macro malware. A file with “.MHT” extension is a Web page archive

Read More >

Lessons Learned from the Slack & Hipchat Breaches

In late March Slack confirmed they had suffered a security breach where “there was unauthorized access to a Slack database storing user profile information”. Slack is a recently launched team collaboration tool that offers organizations a way to simplify communications, file-sharing, project management and more. Organizations sign up their employees

Read More >

CEO, Spires testifies on OPM Breach at Congressional hearing

I am very pleased Mr. Hyde agreed to join to my growing Board of Advisors.  His decades of experience in the Resilient Network Systems’ CEO, Richard Spires, formerly CIO of the U.S. Department of Homeland Security and of the IRS, was invited to testify before the Senate Appropriations Subcommittee on Financial

Read More >

Analyzing an Outlook phishing attack

It is in my routine to read emails before starting my daily work while enjoying my cup of coffee. While browsing for important emails I need to separate spam emails from legitimate emails and analyze the spam emails. I was trying to sort out the spam emails when I came

Read More >