by KarinMuller | Oct 1, 2024 | Deep Dive
Deep Dive – HTTP/2 Rapid Reset Attack HTTPS/2 Rapid Reset DDoS method Flooding targeted servers and websites The HTTP/2 Rapid Reset attack is a powerful new DDoS method that exploits weaknesses in the HTTP/2 protocol. This method enables attackers to generate...
by KarinMuller | Sep 24, 2024 | Deep Dive
Deep Dive – Capital One Data Breach Capital One Data Breach Compliance-induced false sense of security Capital One—a leader in finance—learned the hard way that even compliant systems can fail if they’re not configured correctly. In our latest Threat Talks...
by KarinMuller | Sep 17, 2024 | Deep Dive
Deep Dive – OKTA Data Breach OKTA Data Breach Even security providers aren’t immune How does a company specializing in Identity and Access Management like OKTA suffer a data breach? In this case, a service account password was inadvertently saved by an OKTA...
by KarinMuller | Sep 10, 2024 | Deep Dive
Deep Dive – Accellion File Transfer Appliance Find Threat Talks on Accellion File Transfer Appliance (FTA) Breach How compliance creates operational blind spots You’ve diligently chosen a file transfer tool that is widely trusted, certified and compliant with...
by KarinMuller | Aug 27, 2024 | Deep Dive
Deep Dive – APT Sand Eagle Find Threat Talks on Advanced Persistent Threat Sand Eagle ‘Sand Eagle’ made headlines 📰 for its ability to infiltrate some of the most secure devices on the market—iPhones 📱 used by high-profile Russian officials. Dive Deep into the...
by KarinMuller | Aug 20, 2024 | Deep Dive
Deep Dive – Russia GRU Viasat Hack Find Threat Talks on Russia GRU Viasat Hack Ethan Hunt is known for doing the impossible. Mostly by blowing things up with his team. What if he and his team spoke Russian and on the onset of the invasion of Ukraine, they...