Attack Archives - The Tech Revolutionist
Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps

Golden SAML: Newly Discovered Attack Technique Forges Authentication to Cloud Apps In this article, we introduce a new attack vector discovered by CyberArk Labs and dubbed “golden SAML.” The vector enables an attacker to create a golden SAML, which is…

ForeScout and CyberArk Partner to Dynamically Secure Devices Across the Enterprise to Reduce the Attack Surface

ForeScout and CyberArk Partner to Dynamically Secure Devices Across the Enterprise to Reduce the Attack Surface ·         New partnership offers automated visibility and control of previously unknown privileged accounts on network-connected devices in real time ·         Joint solution enforces security controls, provides…

HP Study Reveals Smartwatches Vulnerable to Attack

HP Study Reveals Smartwatches Vulnerable to Attack HP Fortify finds 100 percent of tested smartwatches exhibit security flaws, provides guidance for secure device use SINGAPORE, July 30, 2015 – As part of an ongoing series looking at Internet of Things…

Messaging Application LINE Used as a Decoy for Targeted Attack

According to Trend Micro’s s latest Targeted Attack Trends 2014 Annual Report, targeted attacks – otherwise known as advanced persistent threats (APTs), have intensified over the past year alongside newly identified techniques. In the latest news, popular mobile messaging application, LINE, was used…

Operation Pawn Storm Ramps Up its Activities; Targets NATO, White House

This year, the North Atlantic Treaty Organization (NATO) members and the White House are the newest targets of the long-running APT campaign Operation Pawn Storm, along with an introduction of new infrastructure. Latest intelligence as a follow-up to Trend Micro’s October…

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities

Threat Actors Targeting APAC Region Continue to Enhance Attack Tactics whilst Exploiting Old Vulnerabilities Trend Micro’s H1 2014 Targeted Attack Trends Report finds that threat actors are still largely able to avoid detection by refining their targeted attack methods Singapore,…

"By Tech Enthusiasts, For Tech Enthusiasts".

The Tech Revolutionist was established in 2012 to bring the latest news from the PC DIY scene to the readers in Singapore. We have now expanded into many other areas in technology, covering a wide scope of topics from lifestyle consumer to enterprise products.

Forget about pretty faces and handsome presenters. Here at The Tech Revolutionist, we go deep into technology to look at how things work, and how it affects the society today.

That's why, our writers are all professionals in the tech industry.

"Think Tech. Speak Tech. Breathe Tech"