Samantha Cruz is a Cyber Operations Researcher at Horangi specializing in cyber research and security tool development. Before joining Horangi, she has worked for Trend Micro as a security analyst and engineer.
In July’s edition of Storyfier Release Notes, we present the newest feature available for our Code Scanner customers, more customization options on Storyfier, and our new blog interface.
Our Product Engineering team has been working hard to push out new Storyfier features, improvements and bug fixes. Let’s take a look at what we’ve just released for June. Slack Integration Storyfier is now integrated with your Slack account so you never miss a notification. Once you connect Slack to Storyfier, we will send you regular organization updates so you
The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the month of May. Let’s take a look at what we’ve just released. Warden is now on AWS Marketplace! First things first, Warden is now available on AWS Marketplace. This is a very big step for us here at Horangi as
We’re excited to introduce to you a new series called Release Notes, where we’ll highlight all the improvements we’ve launched every month, so you can easily stay up-to-date on what’s new. The Horangi product engineering team has been working hard to push out new features, improvements and bug fixes for the past few months. Let’s take a look at what
The last quarter of 2018 has not been the best for companies, as far as cybersecurity is concerned. In December alone, the international hotel chain, Marriott Hotel, experienced a breach that exposed the personal information of as many as 500 million of its customers, including the details of their payment information. Joining the ranks of the unfortunate organizations was the
Why do Hash Lookups? Looking up cryptographic hashes of files is done for various reasons. The first and most common reason is to verify the integrity of a particular file. This is demonstrated in practically every Linux distro download on the web (this is especially vital to prevent headaches arising from corrupted downloads of the ISO file). Another reason to
“You are your data.” It’s a no-brainer to say that data is an everyday part of an average person’s lifetime. People of all ages and backgrounds are connected to the cybersphere doing things like communicating with others, getting work done, and even having some fun. Technology has evolved and advanced exponentially, enabling people people get things done more easily and
In the realm of cyber security, one thing is clear: the weakest link in any security system is the human being. One can have the most state-of-the-art, bulletproof cybersecurity process in the world, but without understanding the nature of a human being, they are all are moot points once someone unauthorized gets hold of access. In fact, a whole branch
Cryptocurrency is, no question, the fastest growing currency in recent years. In fact, the top cryptocurrency exchanges trade as much as US$6.21 billion within 24 hours as of time of writing. In 2017 alone, the value of cryptocurrencies increased by more than 2,700 percent. What used to be a niche market several years ago is now considered as part of
In part 1 of this series, we discussed open-source intelligence (OSINT), how it’s being used, and how it can help an organization in their information security operations. In part 2, we discussed a few tools and techniques used to gather open source intelligence and then some examples of analysis to make sense of the information collected. In the next and