Analytics

Breach of the Month — May 2017

Published on June 7th, 2017 | by Akshay Nayak

Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’... Read More


SERIES

Gone Phishing Extension Appending Attack

Avoiding Extension-Appending Attacks

Published on June 1st, 2017 | by Akshay Nayak

Let’s commence our Gone Phishing series by looking at the first technique – the Extension-Appending Attack. This phishing technique involves an attacker chaining together different types of file extensions. In most cases, this chain starts with... Read More


Analytics

Looking back at WannaCry

Published on May 19th, 2017 | by Vatsal Desai

The ransomware widely known as ‘WannaCry’ made headlines last week after its global spread, notably shutting down healthcare systems across the United Kingdom. Our researchers have taken a look at the infection, and now share their... Read More


Analytics

Breach of the Month — April 2017

Published on May 9th, 2017 | by Vatsal Desai

Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’... Read More


Analytics

Gone Phishing

Published on May 4th, 2017 | by Akshay Nayak

The cyber war currently being waged by ethical hackers and cyber criminals on multiple fronts — encompassing computer, network, and software vulnerabilities — tends to lean in either direction depending on who’s having a bad day.... Read More


Analytics

The Risky Business of Network Ports

Network Ports can be Risky Business

Published on April 19th, 2017 | by Vatsal Desai

Network ports are entry points into your system, and understanding network infrastructure and hosted services helps to determine the ports that are expected to be open on the network. Any listening port that is unexpectedly open... Read More


Back to Top ↑