During Business Email Comproise (BEC) engagements we often have to analyze the provenance of emails. According to the FBI's Internet Crime Report, BEC…

Read more

Given the explosion of development and interest in deep learning models in the past year, we decided to research on the topic to increase our know-how…

Read more

Once again, reading blogs and tweets from James Forshaw led me to wonder how things work. This time, I was working on DCOM for my last blog post and…

Read more

Earlier this year, several security researchers published research about using DCOM to coerce Windows systems to authenticate to other systems. This…

Read more

Bug bounty programs have evolved into a critical element of modern cybersecurity. In this post, we give some answers to how bug bounty programs can…

Read more