article thumbnail

10 Lessons Learned from the Top Cyber Threats of 2021

Security Boulevard

We published a whitepaper about Tactics, Techniques, and Procedures (TTPs) and also tools utilized by the DarkSide threat actors. . Murphy, “Microsoft hack escalates as criminal groups rush to exploit flaws,” Financial Times , 09-Mar-2021. Most notably, US-based Colonial Pipeline Company paid 4.4 Lessons Learned: 3. Lessons Learned: 5.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Of the 209 million tests, 2 million resulted in successful hacking of programs. To learn more about the synergistic power of symbolic execution and fuzzing, download the “What is Behavior Testing” whitepaper here. million successes were the result of 13,875 previously undiscovered bugs. The only cost was Amazon.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

A Reflection On ForAllSecure's Journey In Bootstrapping Behavior Testing Technology

ForAllSecure

Of the 209 million tests, 2 million resulted in successful hacking of programs. To learn more about the synergistic power of symbolic execution and fuzzing, download the “What is Behavior Testing” whitepaper here. million successes were the result of 13,875 previously undiscovered bugs. The only cost was Amazon.

article thumbnail

A REFLECTION ON FORALLSECURE'S JOURNEY IN BOOTSTRAPPING BEHAVIOR TESTING TECHNOLOGY

ForAllSecure

Of the 209 million tests, 2 million resulted in successful hacking of programs. To learn more about the synergistic power of symbolic execution and fuzzing, download the “What is Behavior Testing” whitepaper here. million successes were the result of 13,875 previously undiscovered bugs. The only cost was Amazon.

article thumbnail

If Infosec Was a Supermarket Business

Security Boulevard

Our imaginary supermarket architecture consists of: A main supermarket store. Would you continue to use an e-commerce store if you heard on the news that it had been hacked? Table 1: Key brand considerations for a supermarket and an e-commerce store. Our Topology Figure 1: Parties involved in the supermarket’s architec ture.

InfoSec 52