BorderElliptic

ATTACK VECTOR DEVELOPMENT RESOURCES ... HARMLESS MUSINGS ON DISCREET TACTICAL INCURSION, WEAPONIZED PACKET INJECTION, LATERAL MOVEMENT, PERSISTENT TARGET CONTROL, PRIVILEGE ESCALATION AND FOOTPRINT OBFUSCATION

Three Attack Vectors That Target Your Data - Data Modeling and Integrity Vulnerabilities

Exploit Kits: Lowering the Bar for Malicious Hackers

Weaponize PDF docs to Steal Windows Credentials

Most Common Vectors Exploited Against Critical Infrastructure

Threat Hunting on Common Attack Vectors and Delivery Channels

The Future of Hacking With Nanotechnology