Articles

Weaponizing "Contact Us" Forms: Stopping "ZipLine"-Style Phishing At The Front Door

"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.

Read More
Microsoft Teams Social Engineering Scams: Recognizing The Red Flags

Microsoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.

Read More
Preventing Resource-Exhaustion Attacks By Disgruntled Insiders

A former employee is sent to jail for creating "infinite loops". We examine how non-terminating threads can crash critical systems.

Read More
Quantum Shields: Why Encryption Still Matters In A Post-Quantum Cloud

Quantum threats are increasing. Is it time to do away with encryption? We examine how encryption works today and will likely work tomorrow.

Read More

Latest

Do Your Employees Feel Empowered To Decline Extra Work? You Make The Call

A new survey states that most U.S. workers are ready and willing to decline extra work. Is that how it works in your organization? We want to know.

Read More
Weaponizing "Contact Us" Forms: Stopping "ZipLine"-Style Phishing At The Front Door

"Contact Us" phishing schemes are causing stress. We examine how ZipLine-style attackers turn routine web inquiries into a backdoor malware delivery system.

Read More
Is Workplace Misconduct On The Rise? You Make The Call

A survey reveals most employees feel protected at work, but many employees report different forms of wrongdoing. We chime in and want to know your opinion.

Read More
Microsoft Teams Social Engineering Scams: Recognizing The Red Flags

Microsoft Teams is being used in social engineering scams. We examine the warning signs users should recognize and outline practical steps they should take if they suspect a compromise.

Read More
Protecting IP Assets From Insider Theft And Resale

An executive goes to jail for illegally reselling IP back to his employer. We outline practical governance, contracting, and oversight steps to reduce this hidden fraud risk.

Read More