Topic: metadata analysis

  • Is Your SOC Ready for Business Email Compromise?

    Is Your SOC Ready for Business Email Compromise?

    Business email compromise (BEC) attacks use psychological manipulation rather than technical exploits, bypassing traditional security by mimicking trusted communications and requiring intensive manual investigation. These scams evade detection because they lack malicious code, making them invisib...

    Read More »
  • EFF's Rayhunter: Open-Source Tool to Detect Cellular Spying

    EFF's Rayhunter: Open-Source Tool to Detect Cellular Spying

    The Electronic Frontier Foundation (EFF) has released Rayhunter, an open-source tool that detects cell site simulators used for unauthorized mobile surveillance. Rayhunter runs on affordable hardware, analyzes metadata without capturing personal data, and alerts users via a visual interface when ...

    Read More »
  • Top Infosec Products Launched This Week: September 12, 2025

    Top Infosec Products Launched This Week: September 12, 2025

    Several leading vendors launched innovative security tools this week, addressing key areas such as vendor risk management, data encryption, threat detection, and AI governance. Cynomi's TPRM platform significantly reduces vendor assessment times by up to 79%, boosting operational efficiency and p...

    Read More »