In this blog post, we review the main takeaways from Osterman Research’s latest report, The Rise of Cyber Threats Against Email, Browsers, and Emerging Cloud-Based Channels, which explores the expanding enterprise threat landscape.
Perception Point researchers discovered a vulnerability in macOS which allows attackers to bypass Apple’s SIP (System Integrity Protection) mechanism, and thus take full control over the system, provided that they already managed to achieve code execution with high privileges.
Perception Point researchers have discovered a vulnerability in macOS which allows an attacker to bypass App Sandbox restrictions. This article provides an overview of what the App Sandbox is and the vulnerability details as disclosed to Apple.
In this blog, our researchers demonstrate how they were able to weaponize a Word document with a published macOS/iOS privilege escalation exploit, lift the app sandbox restrictions and gain higher privileges.
A detailed, to-the-point analysis of the most phished brands in email attacks and the importance of asset-based protection as c. 50% of attacks are actually related to the targeted company and its stakeholders.
A zero day attack (also known as a zero day exploit) is one that leverages a software vulnerability that is either unknown or unaddressed by the software vendor; for example, bugs in Microsoft Office apps or Adobe Reader.