Topic: metadata analysis
-
Is Your SOC Ready for Business Email Compromise?
Business email compromise (BEC) attacks use psychological manipulation rather than technical exploits, bypassing traditional security by mimicking trusted communications and requiring intensive manual investigation. These scams evade detection because they lack malicious code, making them invisib...
Read More » -
EFF's Rayhunter: Open-Source Tool to Detect Cellular Spying
The Electronic Frontier Foundation (EFF) has released Rayhunter, an open-source tool that detects cell site simulators used for unauthorized mobile surveillance. Rayhunter runs on affordable hardware, analyzes metadata without capturing personal data, and alerts users via a visual interface when ...
Read More » -
Top Infosec Products Launched This Week: September 12, 2025
Several leading vendors launched innovative security tools this week, addressing key areas such as vendor risk management, data encryption, threat detection, and AI governance. Cynomi's TPRM platform significantly reduces vendor assessment times by up to 79%, boosting operational efficiency and p...
Read More »