Cyber Security

Much like Winter, Breaches are Coming!

Published on July 13th, 2017 | by Joel Roy

It’s no Spoiler to note that cyber threats are more sophisticated than ever, slipping past perimeter defenses and hiding in the normal flow of network communications. For all you Game of Thrones fans, it’s a lot like... Read More


Analytics

Breach of the Month – June 2017

Published on July 10th, 2017 | by Akshay Nayak

Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’... Read More


Analytics

Breach of the Month — May 2017

Published on June 7th, 2017 | by Akshay Nayak

Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’... Read More


SERIES

Gone Phishing Extension Appending Attack

Avoiding Extension-Appending Attacks

Published on June 1st, 2017 | by Akshay Nayak

Let’s commence our Gone Phishing series by looking at the first technique – the Extension-Appending Attack. This phishing technique involves an attacker chaining together different types of file extensions. In most cases, this chain starts with... Read More


Analytics

Looking back at WannaCry

Published on May 19th, 2017 | by Vatsal Desai

The ransomware widely known as ‘WannaCry’ made headlines last week after its global spread, notably shutting down healthcare systems across the United Kingdom. Our researchers have taken a look at the infection, and now share their... Read More


Analytics

Breach of the Month — April 2017

Published on May 9th, 2017 | by Vatsal Desai

Every Friday the SS8 Twitter feed features a notable breach, leak, or hack as our pick for the SS8 #breachoftheweek. At the end of every month, our engineers take a look at each of these ‘finalists’... Read More


Analytics

Gone Phishing

Published on May 4th, 2017 | by Akshay Nayak

The cyber war currently being waged by ethical hackers and cyber criminals on multiple fronts — encompassing computer, network, and software vulnerabilities — tends to lean in either direction depending on who’s having a bad day.... Read More


Back to Top ↑