top of page
Search
Pete Ningcharoen
Sep 4, 20244 min read
Protecting Your Family and Personal Information
Personally Identifiable Information or PII is any information about a specific person that can be used to discover that person’s identity.
Esther Matut
Mar 29, 20241 min read
Celebrating Women in Cybersecurity
Polito would like to share resources aimed at women who are in cybersecurity or who are interested in getting into this amazing field.
Ronny Thammasathiti & James Kelly
Oct 26, 202312 min read
How to Build Your Own DNS Sinkhole and DNS Logs Monitoring System
Pi-hole logs each DNS event, including domain resolutions and blocks. DNS logs are a gold mine that is often overlooked by network defenders
Esther Matut
Aug 16, 20238 min read
Introduction to Proving Grounds
The Proving-Grounds offers both free and paid tier levels, where users can test their skills in a lab environment similar to other platforms
Erica Zelickowski
Jul 25, 20235 min read
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
Erica Zelickowski
Jul 5, 20236 min read
LDAP Queries for Offensive and Defensive Operations
The intention of this post is to provide basic queries for targeted AD DS information gathering used in penetration testing. The reader can
Frank Siepmann
Apr 11, 20234 min read
Why Cybersecurity Needs a Leader - CISO
A Chief Information Security Officer (CISO) might be what these organizations are missing.
Nickolas Baker
Mar 16, 20233 min read
Malicious eFax Attachments Can Potentially Steal Your Microsoft O365 Password
Phishing attack observed by Polito, Inc., which uses an obfuscated JavaScript attachment to show how to analyze the malicious attack.
Fred Mastrippolito
Feb 1, 20233 min read
Enhancing Digital Forensics with X-Ways X-Tensions: VirusTotal Plugin
Polito is pleased to release our VirusTotal extension for X-Ways. This open source extension is useful to quickly triage file hashes
Peter Quach
Jan 9, 20231 min read
Virginia CyberSlam 2023 - Supporting The Next Generation of Cybersecurity Experts
Polito, Inc. is proud to be a sponsor for the 2023 Virginia CyberSlam event being held at George Mason University today. This event brings t
Esther Matut
Dec 14, 20228 min read
Beginner Social Media OSINT/Reconnaissance
OSINT, or Open-source Intelligence, are a set of techniques for data collection and analysis that is publicly available from various sources
Mattia Campagnano
Jun 16, 20226 min read
5 Cybersecurity Lessons From the Ukraine War
Best practices guidelines allow organizations to respond to five lessons learned from the Ukraine war
Esther Matut
Mar 29, 20228 min read
Wicked6 US Cyber Range CTF: Ladies of Space Cows
On March 23rd and 24th, 2022, Wicked6, sponsored by many companies produced a special 24 hour global women's only CTF event virtually.
Fred Mastrippolito
Jan 31, 20222 min read
Introducing Hash Exporter for X-Ways: Automate Your Hash Lists
Polito Inc. is pleased to announce that we are releasing the Hash Exporter extension for X-Ways. Hash Exporter helps automate hash extract
Nihaal Prasad
Oct 5, 20216 min read
Return to Libc: Linux Exploit Development
This blog post will cover how to conduct a ret2libc attack. The ret2libc technique is a tactic used in Linux exploit development that allows
Nihaal Prasad
Aug 10, 20217 min read
How to go Phishing with Gophish
How to conduct basic phishing campaigns using Gophish, an open-source tool for testing an organization’s vulnerability to phishing.
Mattia Campagnano
Feb 23, 20214 min read
Top 3 Reasons Why Organizations Should Get a Penetration Test Today
Cybersecurity breaches and other incidents have become increasingly frequent and more impactful over the last year. In a recent high-profile
Liana Parakesyan
Nov 4, 20206 min read
Masterful Policies and Compliance: Industries, Policies, Regulations, and How to Get Started
Policy assessments should be considered as a cybersecurity best practice and should be conducted annually with other assessments such as vul
Jeffrey Magloire
Oct 19, 20204 min read
Dynamic Analysis Using Autopsy - Part 1
This blog is going to walk you through using the OPSWAT MetaDefender service with the Autopsy digital forensic tool. The first step would be
Daniel Chen
Aug 5, 20203 min read
Enhancing Digital Forensics with X-Ways X-Tensions: Metadefender Plugin
To start, you’ll need your MetaDefender Cloud API key ready. You can sign up for MetaDefender’s free API key at opswat.com. You can downloa
bottom of page