top of page
Business of Security
ORNA
Jan 5, 20234 min read
Undetectable Phishing Attack Discovered in the Wild
This new method abuses third-party single sign-on (SSO) options that are embedded in websites.
37 views
ORNA
Dec 1, 20225 min read
Ransom DDoS Attacks as a Lucrative Attack Vector
Botnets are possibly the second most powerful leveraging weapon to zero-day exploits in the hands of hackers.
20 views
ORNA
Nov 24, 20224 min read
Red Team: An Appendage to Incident Response
Compound a hacking addiction with an uncommonly high intellectual capacity, and it really does not matter what incident response you have.
21 views
bottom of page