Do you even assume breach bro?The Information Security field is, unsurprisingly, a pessimistic one. It’s not a surprise, since every day tens of thousands of highly…Apr 18, 2022Apr 18, 2022
F3EAD the Bear, part 3In previous posts, Prevailion has described how F3EAD, a targeting and intelligence gathering framework, ultimately provides an objective…Apr 13, 2022Apr 13, 2022
Russian Cybercriminals, go hack yourselfAs the conflict in Ukraine wages on, more and more cyber attacks are being carried out against Russian infrastructure and networked systems…Apr 11, 2022Apr 11, 2022
F3EAD the Bear, part 2In Prevailion’s previous post, we shared how using the F3EAD framework to guide our internal targeting and analysis process yields…Apr 8, 2022Apr 8, 2022
F3EAD the BearPrevailion’s newest product, Arktos, provides a unique opportunity for security and risk teams to validate the controls they’ve put in…Apr 6, 2022Apr 6, 2022
Not my circus not my monkeysToday Bleeping Computer reported that hackers had breached MailChimp, a popular email marketing firm and used this access to steal data and…Apr 4, 2022Apr 4, 2022
I see the AcidRains down in Ukraine…This week, SentinelLabs researchers released an analysis of the AcidRain wiper used to attack thousands of Viasat satellite modems across…Apr 1, 2022Apr 1, 2022
IcedID, IcedID baby…Today, Bleeping Computer reported on a new campaign tactic the IcedID authors have been using: compromising Microsoft Exchange servers…Mar 28, 2022Mar 28, 2022
Teach a man to phish…This week, the U.S. Department of Justice indicted three Russian FSB officers and a Russian Federation Central Scientific Research…Mar 25, 2022Mar 25, 2022