By Tal Be'ery | August 28, 2014
The Untold Story of the Target Attack, Step by Step
Today we published our report on the untold story of the Target attack.  The full version is available here. In December 2013, in the midst... Read more
Tags:
By Tal Be'ery | July 22, 2014
Knowledge of the old Password is needed to change password
Our last blog entry on an Active Directory vulnerability which enables an attacker to change a user’s password, garnered a lot of attention. Since we... Read more
Tags:
By Tal Be'ery | July 15, 2014
Knowledge of the old Password is needed to change password
Update ( July 24 2014): We had published an FAQ page Nearly all advanced targeted attacks involve stolen credentials and identity theft. As part of our... Read more
Tags:
By Idan Plotnik | July 1, 2014
dn458536.mapp-214x214
Today I’m proud to announce that we’ve joined the Microsoft Active Protections Program (MAPP). MAPP is a program from the Microsoft Security Response Center (MSRC)... Read more
By Aorato | June 5, 2014
Sun Tzu:"He who knows when he can fight and when he cannot, will be victorious."
Aorato’s VP of Research had an interesting thesis on applying the ancient principles of warfare to the Cyber arena, which was published in SecurityWeek. Here’s the thesis’... Read more
By Tal Be'ery | May 21, 2014
Microsoft Security Advisory title change
Exploiting the Pass-the-Hash vulnerability is the weapon of choice for most APT attackers.  Therefore when Microsoft released a Windows’ update on May 13th titled: “Update... Read more
Tags: