How Cyber Attackers Use the Custom-Built Exfiltration Tool BlackMatter
By Mark Vaitzman. February 24, 2022
Data exfiltration is a tactic that allows cyber attackers to steal sensitive data and extract it outside of the organization. The MITRE ATT&CK framework defines nine different techniques and eight...
The Hidden Threats of Potentially Unwanted Programs (PUPs)
By Mark Vaitzman. August 16, 2021
Potentially Unwanted Programs (PUPs) – also known as Potentially Unwanted Applications (PUAs) – often come installed with freeware. Commonly referred to as junkware, bundleware, or adware, PUPs are...