DDE Exploitation – Macros Aren’t the Only Thing You Should be Counting

Exploitation of the Microsoft® Dynamic Data Exchange (DDE) protocol is increasingly being used to ...

The Role of Machine Learning in Intelligent Threat Response

Machine learning, or artificial intelligence (AI), is the most recent buzzword making its way ...

Cyber Threat Scoring is not Risk Assessment

Companies face such a large and diverse cyber threat landscape, it seems almost impossible to ...

Down the BadRabbit Hole: Ransomware Delivered by Fake Flash Updates

In the past few weeks, a new strain of self-propagating ransomware dubbed BadRabbit emerged via ...
tech-corner

Moving Beyond Threat Hunting to Actively Counter Threats

For those of you building proactive cybersecurity programs, this blog will cover some tips that I ...

4 Easy Ways to Avoid Being a Victim of Clickjacking

Clickjacking, also known as a "UI Redress Attack,” is a tricky method of getting a user to click ...
how-to-thwart-a-rainbow-table-attack

How to Thwart a Rainbow Table Attack

We all know that a strong password is a necessary first step for good cyber hygiene. However, in ...
So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

So You Want to Implement a Threat Intelligence Program? Here’s How to Build One Successfully

In many respects, Threat Intelligence (TI) programs are still in their infancy, and security ...
Polarity -  LookingGlass ScoutPrime Integration

Polarity & LookingGlass ScoutPrime Integration

In collaboration with LookingGlass, Polarity developed a real-time integration to the LookingGlass ...

CTO Corner: Threat Correlation Techniques for Assessing Targeted Attacks (Part 2)

In our last blog, Chief Technology Officer Allan Thomson and Principal Data Scientist Dr. Jamison ...