Phishing Attacks and Social Engineering: Recognizing the Signs and Preventing Exploitation
top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


In today's digitally connected world, cybersecurity is no longer optional—it's a necessity. At Inception Security, we know that the only...


- 2 min
Understanding ManageEngine Vulnerability CVE-2022-47966
ManageEngine's CVE-2022-47966 vulnerability is a critical issue that allows an attacker to gain remote code execution on the server...


- 2 min
Understanding the Exchange Server Attacks: Exploiting CVE-2022-41040 and CVE-2022-41082
In recent months, we have seen a surge in attacks targeting Exchange Servers. These attacks have been made possible by exploiting the...


- 3 min
Play Ransomware Group
The Play ransomware group has been making headlines recently due to its use of a new method to exploit vulnerabilities in Microsoft...


- 3 min
Citrix CVE-2022-27518
Citrix is a global leader in providing digital workspace solutions, and as such, it is a popular target for cyber attackers. One such...


- 2 min
Citrix CVE-2022-27516
CVE-2022-27516 is a severe vulnerability recently discovered in Citrix, a widely-used software program. This vulnerability has the...


- 2 min
Fortinet CVE-2022-42475
CVE-2022-42475 is a recently discovered vulnerability in the software that powers Fortinet, a popular cybersecurity company. This...


- 2 min
Forensic Friday - Jump Lists
What are Jump Lists? Jump Lists are windows features introduced with Windows 7, and they contain information about recently accessed...


- 2 min
Remote Assistance Tools - T1219
Let's talk about remote assistance tools! As you would expect, a remote assistance tool is used to assist end-users from a remote...


- 3 min
Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....


- 3 min
Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...


- 3 min
Cyber Insurance Benefits
What is Cyber Insurance? A cyber insurance policy is commonly called "cyber risk insurance" or "cyber liability insurance" coverage. It...


- 3 min
Forensic Friday - Profile Lists
What are Profile Lists? Windows keeps track of user-profiles and their locations in the registry. The profile location is stored under...


- 3 min
CVE-2022-1388 (F5 BIG-IP)
CVE-2022-1388 is a critical CVE (CVSS 9.8) in F5 Networks’ BIG-IP solution management interface. This CVE will allow threat actors to...


- 3 min
Forensic Friday - Prefetch
What is Windows Prefetch? Windows Prefetch creates files when a user opens an application on a Windows host. The Windows Operating system...


- 3 min
Emotet Changing Techniques
Phishing attacks remain the number one technique used in cyberattacks. Some of the most common phishing attacks leveraged attachments to...


- 3 min
Spring4Shell
A critical vulnerability CVE-2022-22965 (Spring4Shell or SpringShell) was found on March 29, 2022, in an open-source Java framework while...


- 2 min
RPC Vulnerability (CVE-2022-26809)
On patch Tuesday, April 12, 2022, Microsoft released patches for CVE-2022-26809. A vulnerability that is a zero-click exploit targeting...


- 1 min
Cyberattacks On The Rise
As we look across the landscape, we see that cyberattacks continue to succeed in all business sectors. In the cases we have observed, the...


- 3 min
Importance of EDR
Endpoint Detection & Response (EDR) A critical task for most organizations has become setting up advanced threat protection as...
bottom of page