top of page

Business of Security

ORNA
Jan 26, 20235 min read
Web Browsers: An Overlooked Vulnerable Nerve Center
Once the browser account is compromised, it'd be no different for a threat actor to log into your accounts as you do. Point. Click. Enter.
65 views

ORNA
Jan 19, 20235 min read
Pwning the Box Over Remote Desktop Protocol
Inside almost every hacktivist is a secret blackhat. This is a secret you're not supposed to be privy to.
48 views

ORNA
Jan 10, 20234 min read
Hackers Plant Fake Digital Evidence in Campaign Targeting Human Rights Activists
ModifiedElephant has been in operation since “at least 2012” and is able to weaponize off-the-shelf remote access trojans.
36 views
bottom of page