Threat Primer Posts

Cyber SecurityThreat Primer

Reflected Cross-Site Scripting: Threat Primer

The premise of a Reflected Cross-Site Scripting attack is that certain websites accept user input that they "reflect" back to the user somewhere in their interface/portal.  For example, imagine a website that asks for your first name, your job title, or your phone number.  Think that input is shown somewhere in the interface, perhaps in an accounts page or somewhere else?  It most likely is.  And that's not necessarily a problem.  But, the problem is a half-step away, if the website's developer was even slightly careless.

Threat Primer - Reflected Cross-Site Scripting - Square for Blog
Cyber SecurityThreat PrimerWorms

Threat Primer: Worms

A worm is a self-propagating code execution attack that causes damage on each host that it infects.  In less technical terms, a worm is a virus that causes damage, then finds another host to propagate to.  This process repeats until it is stopped in its tracks by some effective mitigation, or until it cannot find any additional hosts to transfer to.  Here are the key steps that attackers use to implement this type of attack.

Threat Primer - Worms
Cyber SecurityPhishingRemote WorkThreat Primer

4 Phishing Steps that Cyber Criminals Use Against You

When cyber criminals using phishing against you or your company, they take fraudulent action to pretend to be someone they aren’t. They seek to extract data, financial resources, and personal information to use against you or your employees. Read on, for the four phishing steps that cyber criminals use against you, and how Mail Armor from Havoc Shield can help.

Threat Primer - Phishing - Square for Blog Featured Image