Viewpoint: An Eagle’s Eye Into Cyber Data
So, we did a pretty exciting thing! We were recently awarded a United States patent for what we believe is game-changing technology. It’s called Viewpoint™, it’s built on an augmented reality gaming platform, and we’d like to share it with you.
The Phishing Adventures of Huck Phinn, Reeling In the Damage
Chapter 5
In the previous chapter, we left Huck with no idea he had given a phishing scammer access to his employee network credentials. But beneath the calm surface of the normal work routine, the attacker was taking full advantage of his
The Phishing Adventures of Huck Phinn, Another Kettle of Phish
Chapter 4
Huck had narrowly eluded several phishing traps, and he now routinely screened his work Outlook email inbox for suspicious messages. He knew the red flags to look out for, but how could he keep his guard up 24/7?
The Phishing Adventures of Huck Phinn, Deep Water Spear Phishing
Chapter 3
In the previous chapter, Huck Phinn, who works for an environmental group, narrowly escaped a phishing email trap by recognizing red flags. But he still remained a target of other “phishers” trying to lure him.
One day, a message to Huck’s
The Phishing Adventures of Huck Phinn, Dangling Bait in Open Waters
Chapter 2
In Chapter One we mentioned that the most common phishing attacks are mass emails sent to as many recipients as possible in hopes that even a few high-value targets will be compromised.
That’s what happened when Huckleberry "Huck" Phinn, a
HAFNIUM targeting Exchange Servers with 0-day exploits
Microsoft has detected multiple 0-day exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. Microsoft Threat Intelligence Center (MSTIC) attributes this campaign with high confidence to