Search Results for: HTTPS Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention.... Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding... Blog Post Google hides “www” and “https://” from Chrome February 1, 2020 Google has decided to hide the “www” trivial subdomain, “http” and “https://” in the address bar when visiting a website.... Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of... Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to... Blog Post Phishing Sites Using Lock Symbol to Prove Legitimacy November 28, 2018 When accessing a website, the green padlock on the left corner indicates that the connection between the website and user... Blog Post Emotet is Back on the Main Stage Thanks to Trickbot November 16, 2021 After we reported that the Emotet infrastructure was taken down by law enforcement here, security researcher Luca Ebach found that another malware botnet called Trickbot is helping Emotet to... Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations... Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations... Blog Post Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021 Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to... Blog Post BBC Migrates to HTTPS Completely, Gets Blocked in China August 7, 2018 China’s so-called ‘Great Firewall’ has blocked the entirety of BBC’s websites after the British Broadcasting Corporation transitioned from HTTP to... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security... Blog Post Hackbits Powered by LIFARS – Episode 7: Cybersecurity Spotlight November 11, 2021 It was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated...
Blog Post Why Do You Need To Be Concerned About HTTP Request Smuggling? October 21, 2021 Over the last few months, HTTP request smuggling, the security exploit on the HTTP protocol, has gained extensive community attention....
Blog Post The Implementation of HTTP/2 May be Exposing Websites to Risk September 7, 2021 James Kettle – director of research at PortSwigger – demonstrated at BlackHat 2021 how attackers can exploit current practices surrounding...
Blog Post Google hides “www” and “https://” from Chrome February 1, 2020 Google has decided to hide the “www” trivial subdomain, “http” and “https://” in the address bar when visiting a website....
Blog Post Protect Yourself While Sharing & Downloading Files April 13, 2020 Sharing and downloading files, such as documents, programs, pictures, music, and movies is one of the most appreciated aspects of...
Blog Post Threat Actors Exploitation of COVID-19 Pandemic – FBI Alert May 2, 2020 The FBI’s Weapons of Mass Destruction Directorate in coordination with the Office of Private Sector is providing this LIR to...
Blog Post Phishing Sites Using Lock Symbol to Prove Legitimacy November 28, 2018 When accessing a website, the green padlock on the left corner indicates that the connection between the website and user...
Blog Post Emotet is Back on the Main Stage Thanks to Trickbot November 16, 2021 After we reported that the Emotet infrastructure was taken down by law enforcement here, security researcher Luca Ebach found that another malware botnet called Trickbot is helping Emotet to...
Blog Post A Closer Look at the Russian Actors Targeting Organizations in Ukraine March 3, 2022 In the context of the ongoing war between Russia and Ukraine, we have reviewed the cyberattacks against the Ukrainian organizations...
Blog Post Forensics Analysis of the NSO Group’s Pegasus Spyware January 12, 2022 NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations...
Blog Post Hackbits host Gaspare Marturano interviews LIFARS Director of Global operations Bailey Saltz about careers in cybersecurity November 1, 2021
Blog Post Critical Infrastructure: A Prime Target in CyberWarfare March 4, 2022 The U.S. Department of Homeland Security (DHS) categorizes critical infrastructure as physical or virtual systems or assets so vital to...
Blog Post BBC Migrates to HTTPS Completely, Gets Blocked in China August 7, 2018 China’s so-called ‘Great Firewall’ has blocked the entirety of BBC’s websites after the British Broadcasting Corporation transitioned from HTTP to...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post The Colonial Pipeline – DarkSide Ransomware Attack May 11, 2021 Last week, the United States experienced one of the most significant cyber-attacks in its history. The Department of Homeland Security...
Blog Post Hackbits Powered by LIFARS – Episode 7: Cybersecurity Spotlight November 11, 2021 It was a pleasure interviewing Paul Caiazzo. Paul is a cybersecurity expert, entrepreneur, strategist, CISO and CPO. Paul has dedicated...