Research and Development

Research and Development

Basic Web Application Attacks

In Basic Web Application Attacks (BWAA), we are largely focusing on attacks that directly target an organization’s most exposed infrastructure, such as Web servers. These incidents leverage one or the other of two entry points, the Use of stolen credentials or Exploiting a vulnerability. Attacks within this pattern are split between two areas. The means […]

Basic Web Application Attacks Read More »

A Few Words About Rampant Rampaging Ransomware

That’s how Verizon’s report named this ever-growing type of attack. That trend has continued with an almost 13% increase this year (an increase as large as the last five years combined). Keeping in mind that while insidious, Ransomware alone is simply a model of monetization of a compromised organization’s access that has become quite popular.

A Few Words About Rampant Rampaging Ransomware Read More »

Web Application Pattern in Cybersecurity Incidents Still Growing

Patterns are essentially clusters of similar incidents. You can see there are eight patterns in this  year’s Verizon report. Basic Web Application Attacks These attacks are against a Web application, and after initial compromise, they do not have a large number of additional Actions. It is the “get in, get the data and get out”

Web Application Pattern in Cybersecurity Incidents Still Growing Read More »

Web Applications Are the Most Targeted Resources in Hacks

Assets are the things that you try to preserve. You can also find what was hacked via an exploit, and who was socially engineered by an attacker. This should help you understand what is being targeted and how to prioritize what type of coverage your infrastructure needs. Check out the specific types of servers on

Web Applications Are the Most Targeted Resources in Hacks Read More »

External Attacks Are Still More Likely Than Internal

External Attacks Are Still More Likely Than Internal 2022 Verizon’s annual Data Breach Information Report (DBIR) findings indicate that data compromises are considerably more likely to result from external attacks than from any other source. Nearly three out of four cases came from outside the victim organization. Business partners were involved in 39 percent of

External Attacks Are Still More Likely Than Internal Read More »