Skip to main content

Interpres Blog

See all resources

Filter

BlogReport

Return of the mac(OS): Transparency, Consent, and Control (TCC) Database Manipulation

As the macOS desktop user base continues to grow year by year, adversaries are adapting…
BlogReport

Windows Phantom DLL Hijacking: Turning “Nonexistent” DLLs into Real Threats

The Windows operating system (OS) references a surprising number of DLL files that do not…
Blog

Interpres: The Missing Intelligence Layer for CTEM

The Gartner Continuous Threat Exposure Management (CTEM) strategy is designed to capture the outputs from…
Blog

Defense Surface Optimization: See Your Enemies, Know Your Defenses

To effectively optimize your cyber defenses requires knowing the strengths and weaknesses of your security…
Blog

International Women’s Day Spotlight: Marina Liang and Her Journey to the World of Cyber

As the fight for equity continues, Interpres Security would like to recognize all women and…