-
Join Interpres Security in San Francisco for RSA, BSides and the ISSA Cyber Executive Forum
Read MoreHead of Threat Research at Interpres hosts session at BSides San Francisco on using AI as an “intern” for continuous threat intelligence.
-
New Capabilities to Mitigate Threat Exposure and to Continuously Validate Cybersecurity Defenses: Q2 2024 Product Update
Read BlogInterpres releases major platform updates at RSA 2024, adding new capabilities for improved threat exposure management.
-
Interpres Security Unveils Significant Platform Updates to Help Organizations Effectively Manage Threat Exposure & Automate MITRE ATT&CK Alignment
Read NewsContinuous Threat Exposure Management (CTEM) startup offers free product trial and adds new MITRE ATT&CK® Matrix, AI Assistant, custom reporting capabilities, and enhanced EDR policies to its platform
-
DPRK Exploits 2 MITRE Sub-Techniques: Phantom DLL Hijacking, TCC Abuse
Read MoreNorth Korean hackers break ground with new exploitation techniques for Windows and macOS…
-
MacTech News: As macOS Malware Grows In Popularity, Windows Exploits Remain Another Vector of Choice For Threat Actors
Read MoreAs the macOS desktop user base continues to grow year over year, and Windows remains a mainstay, adversaries are growing more adept in their strategies to become more versatile cross-platform…
-
Apple World Today: As macOS Malware Grows In Popularity, Windows Exploits Remain Another Vector of Choice For Threat Actors
Read MoreAs the macOS desktop user base continues to grow year over year, and Windows remains a mainstay, adversaries are growing more adept in their strategies to become more versatile cross-platform…
-
Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation
Read BlogAs the macOS desktop user base continues to grow year by year, adversaries are adapting their strategies to become more cross-platform. Gone are the days when macOS was considered immune to malware. This report delves into the evolving landscape of cyber threats, focusing on adversarial techniques aimed at manipulating the Transparency, Consent, and Control (TCC) framework database.
-
Windows Phantom DLL Hijacking: Turning “Nonexistent” DLLs into Real Threats
Read BlogThe Windows operating system (OS) references a surprising number of DLL files that do not exist. Thus, phantom DLL hijacking occurs when the adversary names their malicious DLL to match the non-existent file and writes it to the specified location of one these referenced missing files.
-
Interpres Security Threat Intelligence Engineer Marina Liang publishes research on APAC Hackers Hijacking Windows DLL & Abusing macOS Security Framework
Introduction As the macOS desktop user base continues to grow year over year, and Windows remains a mainstay, adversaries are growing more adept in their strategies to become more versatile...Read Blog
Interpres Security operationalizes TTP-based threat intelligence and automates continuous exposure monitoring to help CISOs and security practitioners reduce threat exposure. The Interpres Threat Exposure Management Platform analyzes the dynamic relationship between defensive and adversarial capabilities, assets, and their exploitable vulnerabilities; prioritizes the required defensive actions; and optimizes the security environment, to provide continuous threat exposure management.