INDALA Badge Cloning Using a Home-Brewed Hacking Device

INDALA Badge Cloning Using a Home-Brewed Hacking Device

In this episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, goes into PART 2 of how hackers can steal and clone badges. During this video, Josh will show you how hackers can attempt to steal INDALA Badges using a home-brewed hacking device...
What is Red Team in Cybersecurity?

What is Red Team in Cybersecurity?

What is Red Team in Cybersecurity? In this blog post and video, we explore what Red Teaming consists of and how businesses are using this exercise to keep their operations secure. Scroll below for an animated video explanation or read the transcript below! What is Red...
Website Cloning: How Do Hackers Do Things

Website Cloning: How Do Hackers Do Things

In our third episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, shows you how hackers can make a copy of a website and clone it for their own malicious purposes. During this video, Josh will show you how hackers are cloning websites using...
Malicious Email Harvesting: How Do Hackers Do Things

Malicious Email Harvesting: How Do Hackers Do Things

In our second episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, shows you how hackers harvest email addresses for malicious purposes. During this video, Josh will show you how hackers use a variety of paid and non-paid OSINT (Open-Source...
Cyber Fraud Alert Issued for Websites Collecting NPI

Cyber Fraud Alert Issued for Websites Collecting NPI

In February, The New York State Department of Financial Services (DFS) released guidance on a cyber fraud campaign targeting websites that collect non-public information (NPI).  Essentially, fraudsters are exploiting misconfigurations in websites and web applications...
Shodan: How Do Hackers Do Things

Shodan: How Do Hackers Do Things

We are excited to introduce our new video series, How Do Hackers Do Things! How Do Hackers Do Things will focus on different methods of hacking that cybercriminals use to exploit their victims. Our goal is bring awareness to the vulnerabilities and hacking methods...
Update on SolarWinds Cyberattack

Update on SolarWinds Cyberattack

Last week, SolarWinds announced that its Orion platform was compromised in a sophisticated cyberattack that ultimately used the platform’s update server to distribute malware to over 18,000 SolarWinds customers. While GraVoc does not have the SolarWinds Orion platform...
Security on Azure

Security on Azure

During our VDI Explained webinar, our Director of Risk Management & Audit, Brian Brunelle, explored the security benefits of Azure.Microsoft Azure is a cloud computing service created by Microsoft for building, testing and managing various applications through...