Skip to content
FRSecure
Information Security Experts
FRSecureFRSecure
  • Services
      • Build Your Security Program
        • Virtual CISO
        • Incident Response
        • Risk Assessment
        • Cloud Security Assessment
        • Gap Assessment
        • Tabletop Exercises
        • Vendor Risk Management
        • Vulnerability Management
      • Attack Simulation
        • Penetration Testing
        • Purple Team
        • Social Engineering
        • Vulnerability Scanning
      • On-Demand Security Experts
        • Virtual CISO
        • Incident Response
        • PCI DSS
        • Tabletop Exercises
        • Information Security Policy Coaching
      • Compliance Preparation
        • PCI DSS
        • Cloud Security Assessment
        • CMMC
        • Risk Assessment
        • Gap Assessment
        • Vendor Risk Management
        • SOC 2 Audit
    • Learn
      • Blog
      • Project Hyphae
      • InfoSec Blueprint
      • CISSP Mentor Program
      • Podcasts
      • Resources
      • Newsletter
    • About
      • Awards
      • Careers
      • Client Stories
      • Certifications
      • Team Ambush
      • Hacks & Hops
      • Leadership
      • Partnerships and Brand Guidelines
    CONTACTINCIDENT RESPONSE
    Search:
    • Services
      • Build Your Security Program
        • Virtual CISO
        • Incident Response
        • Risk Assessment
        • Cloud Security Assessment
        • Gap Assessment
        • Tabletop Exercises
        • Vendor Risk Management
      • Attack Simulation
        • Penetration Testing
        • Purple Team
        • Social Engineering
        • Vulnerability Scanning
      • On-Demand Security Experts
        • Virtual CISO
        • Incident Response
        • PCI DSS
        • Tabletop Exercises
      • Compliance Preparation
        • PCI DSS
        • CMMC
        • Risk Assessment
        • Gap Assessment
        • SOC 2 Audit
        • Vendor Risk Management
        • Cloud Security Assessment
    • Learn
      • Blog
      • CISSP Mentor Program
      • Events
      • Podcasts
      • Resources
      • Webinars
    • About
      • Awards
      • Careers
      • Client Stories
      • Certifications
      • Leadership

    Blog

    View allAudit PrepC-SuiteCISSPCloud SecurityCultureCyber InsuranceFramework AssessmentsIncident ResponseInformation SecurityLabsMedia AppearancesNewsPCIPenetration TestingPersonal SecurityRisk AssessmentsSecurity BreachesSecurity StandardsSocial EngineeringToolsUncategorizedvCISOVendor Risk ManagementVulnerability ManagementVulnerability Scanning
    monochrome orange image of a man looking frustrated at a computer representing business email compromise payload

    Significant Business Email Compromise Payloads: 2025 State of InfoSec Series

    By Oscar MinksOctober 9, 2025
    Read more
    oscar minks presenting at hacks and hops darkened with the text "2025 state of infosec: incident response stories & findings"

    2025 State of Infosec: Incident Response Stories and Useful Findings

    By Oscar MinksMarch 28, 2025
    Read more
    incident response horror stories blog header image

    Tales from the enCRYPTions: Incident Response Horror Stories

    By "Pinky"October 31, 2023
    Read more
    microsoft exchange vulnerabilities

    Microsoft Exchange: You Patched, but Did You Threat Hunt?

    By FRSecureApril 7, 2022
    Read more
    microsoft exchange vulnerabilities

    CVE-2021-44228: Log4j Vulnerability

    By Oscar MinksDecember 12, 2021
    Read more
    microsoft exchange vulnerabilities

    Cyber Actors Exploiting MS Exchange Vulnerability

    By Oscar MinksDecember 3, 2021
    Read more
    Project-Hyphae-Free-Threat-Intel

    Introducing Project Hyphae: Free Threat Intel

    By Oscar MinksOctober 13, 2021
    Read more
    REBOL Yell REBOL Exploit

    The REBOL Yell: A New Novel REBOL Exploit

    By Oscar MinksOctober 5, 2021
    Read more
    incident response playbook header image

    Incident Response Playbooks: Steps for Minimizing Damage

    By FRSecureSeptember 16, 2021
    Read more
    Living Off the Land Attacks

    Living Off The Land Attacks: Tools, Tactics, and Prevention

    By Chris KastanAugust 2, 2021
    Read more
    Phishing with Minks

    Year of the Zero-Day Vulnerability: Phishing with Minks

    By Oscar MinksJuly 13, 2021
    Read more
    people standing around computer with app with single-factor authentication

    Single-Factor Authentication on Public Logins

    By FRSecureMay 24, 2021
    Read more
    1234→
    Follow FRSecure on Facebook Follow FRSecure on LinkedIn Follow FRSecure on BlueSky Follow FRSecure on Instagram Subscribe to FRSecure on YouTube
    CONTACT US
    877-767-1891
    SUBSCRIBE
    SERVICES
    Virtual CISO
    Penetration Testing
    Incident Response
    Risk Assessment
    Vulnerability Scanning
    Social Engineering
    PCI
    Gap Assessment
    Tabletops
    Vendor Risk Management
    Purple Team
    SOC 2
    CMMC
    Cloud Security Assessment
    OBJECTIVE
    Build Your Security Program
    Attack Simulation
    On-Demand Security Experts
    Compliance Preparation
    COMPANY
    About
    Blog
    Contact
    Careers
    Case Studies
    Resources
    Privacy Policy
    Press Kit
    © 2025 FRSECURE LLC
    Go to Top