In business email compromise (BEC) attacks, a threat actor usually compromises a corporate email account and uses that account to send fraudulent emails. Based on...
Organizations of all kinds are embracing the cloud—including software, platform and infrastructure as a service (SaaS, PaaS, and IaaS)—for its economics, its flexible scalability, and...
Kirk Trychel is the technical lead for cloud penetration testing at Secureworks® Adversary Group. At Secureworks Adversary Group, we do a ton of cloud testing...
Adversarial testing is essential to ensure the safety of patients, the confidence of regulators, and the continued acceptance of a technology that is transforming healthcare...
Summary: Credentials are compromised in a variety of ways, including hacked websites, predictable patterns and weak passwords. Companies from all business sectors often have similar...
Summary Adversary tactics, techniques, and procedures (TTP) are evolving significantly increasing security risk Compliance frameworks – such as PCI DSS, NIST – are minimum security...