

Bob Rudis
Chief Data Scientist /*=$expert->feature_status*/ ?>
Rapid7
Comments Dotted :
4
May 07, 2020
Organisations should apply the same logic they would to any incoming request for link clicking, document downloading, or charitable giving.
With Covid-19 pressing down upon us, we are again reminded of how critically important it is to secure our devices and networks so we can avoid impacting our currently over-strained hospital care environments further. These types of ransomware campaigns prey upon the fear, generosity and curiosity of the chosen victims to gain access to something of value, be it banking credentials or your device or laptop to launch further campaigns or to gain access to your network.
Organisations should.....Read More

April 01, 2020
Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day.
If there is an insight to be gleaned from the recent, second breach at Marriott International that is to remain vigilant for new attacks even if you've just experienced one. Successful phishing campaigns can happen to anyone and any organisation, and the use of stolen, legitimate credentials is still one of the most popular attack vectors for our adversaries.
Current disruptions in traditional work patterns also increase the likelihood of more frequent and clever attacks occurring every day......Read More

February 03, 2020
Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs.
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not.....Read More

January 31, 2020
Social Captain should have worked with Instagram to have whatever functionality they needed baked into the API-proper vs.
Individuals should think twice before letting a third-party site, service, or application use actual credentials for things like Twitter, Instagram, Facebook (et al) since such a requirement inherently means those credentials will be stored in a way to be reused (i.e. the passwords will not be hashed). Furthermore, the OAuth standards were developed to enable support for third-party workflows without the need to give unrestricted access via the use of user-credentials. If a site's API does not.....Read More
