CONTRIBUTOR RAY POMPON

blog /Sept 07, 2017

Phishing for Information, Part 4: Beware of Data Leaking Out of Your Equipment

Organizations often overlook the many ways in which their own systems put useful information right into the hands of attackers building cyber scams.

blog /Aug 31, 2017

Six Steps to Finding Honey in the OWASP

According to Verizon’s 2014 Data Breach Investigations Report, “Web applications remain the proverbial punching bag of the Internet.” Things haven’t improved much since then. What is it about web applications that makes them so...

blog /Aug 29, 2017

URL Obfuscation—Still a Phisher's Phriend

Cyber crooks use several common URL disguising techniques to trick users into thinking their sham sites are legitimate.

blog /Aug 22, 2017

Phishing for Information, Part 3: How Attackers Gather Data About Your Organization

The Internet is full of information about your company that’s easily accessible to anyone and particularly useful to attackers.

blog /Aug 15, 2017

Where Do Vulnerabilities Come From?

Vulnerabilities are an emergent property of modern software’s complexity, requested features, and the way data inputs are handled.

blog /Jul 20, 2017

Phishing for Information, Part 2: How Attackers Collect Data About Your Employees

The personal and job-related information that employees often innocently post on various websites makes it easy for phishers to pull off their scams.

blog /Jul 18, 2017

How to Avoid the Six Most Common Audit Failures

A veteran auditor told us how organizations fail audits. Here are six detailed strategies to help you achieve success.

blog /Jul 11, 2017

Who Should the CISO Report To?

Savvy organizations that understand the gravity of cyber security are giving CISOs a voice at the executive table.

blog /Jul 06, 2017

Phishing for Information, Part 1: How Phishers Bait Their Hooks with Information You Volunteer

In this five-part blog series, we look at how cyber scammers vacuum up information across the Internet to build profiles for phishing and other kinds of social engineering attacks.

blog /Jun 21, 2017

Russian Hackers, Face to Face

An undercover interview of two infamous Russian hackers speak volumes about skills, passion, and motivation of some of the world’s most dangerous cybercriminals.

stay up to date

Get the latest application threat intelligence from F5 Labs.

There was an error signing up.
Thank you, your email address has been signed up.

Follow us on social media.