Third Party Permissions and Session Management in Social Media It has become apparent that online account management is a hugely…
cyberintelligenceA collection of 19 posts
About The DarkNet – A little History The darknet didn’t make so much sense until 2000 with the release of…
Why Threat Intelligence? The power to predict future attacks even before they reach targeted networks can help organizations prioritize their…
Credential stuffing is a type of attack where stolen account credentials which comprises of username,passwords and email addresses are used to accomplish account takeover through automated web injection
Peleg Hadar, a security researcher at safe breach Labs has discovered a vulnerability in the Trend Micro Password Manager software….
In recent years, smart home virtual assistants have come into wide use. These include products such as Google Home and…
Apps that are less secure don’t use modern security standards, such as OAuth. Using apps and devices that don’t use modern security standards increases the risk of accounts being compromised. Blocking these apps and devices helps keep your users and data safe.
The Importance of Cyber threat intelligence Cyber threat Intelligence involves tracking, and analyzing digital security threats with the sole aim…
Business Email Compromise (BEC) Scam popularly known in Nigeria as “wire-wire” is a type of scam targeting companies that conduct wire transfers. Often, attackers impersonate the CEO, CFO or any executive in the company authorized to do wire transfers.