Please enjoy our newest podcast, the Weekly Security Sprint, via Spotify for Podcasters and available on Spotify, Apple, Google, as well as other locations…
Enjoy our newest podcast accessible on Anchor, Spotify, Apple, Google, and wherever you enjoy your favorite podcasts! See more links on the Anchor page. In…
By Andy Jabbour This is an update to the original post, “Terminology for $500. What Are Blended Attacks?” 26 May…
By Andy Jabbour Please note, this post has been updated to reflect the changes posted in update 1.1, 01 Mar…
On 27 July, Gate 15’s Kristi Horton and SurfWatch Labs’ Adam Meyer addressed: Recent extortion and ransomware attacks against entertainment…
About a week ago, as we were coming out of the initial concerns relating to the WannaCry ransomware outbreak, I…
Business Email Compromise (BEC) is a more specific form of Email Account Compromise (EAC). Email accounts can be compromised by…
Vocabulary.com defines extortion as “forcing someone into giving you something through threats.” Most commonly the extortioner desires money but it…
Recently, two Gate 15 team members – Kristi Horton, Senior Risk Analyst in Cybersecurity, and Chip Wickenden, Director of Strategic…
In this reporting period, the the Gate 15 Threat and Risk Analysis Cell (TRAC) honed in on four notable areas of concern in Wednesday’s…