Archive for the "spear phishing" Category

New Infographic: What the 2013 Verizon Data Breach Report tells us about phishing



I just published a new blog post on our ThreatSim blog “What the 2013 Verizon Data Breach Report tells us about phishing“. We put together an infographic that lays out some of the highlights from the report.

Fighting The Advanced Attacker: 9 Security Controls You Should Add To Your Network Right Now


 We have a new post over at the ThreatSim Blog “Fighting The Advanced Attacker: 9 Security Controls You Should Add To Your Network Right Now“. It is a list of 9 things that everyone should be doing with their existing devices, infrastructure and network. Other than a lot of hard drive space (heh) the recommendations don’t cost much.

If you are in a role that requires you to defend against advanced attackers you should check out our ThreatSim attack simulation service.



Follow us: @stratumsecurity

Announcing ThreatSim – Stratum’s Spear Phishing and Data Exfiltration SaaS Offering


We are finally able to share something exciting that Stratum has been working on for the past several months.

If you look at recent data breaches– the kind where the attackers are inside the network hanging out and shipping sensitive data out of the network– you will find two things in common: spear phishing is how they got in and some form of data exfiltration is how they got out. Read Mandiant’s M-Trends report or the Verizon Data Breach Reports; it’s all discussed in-depth. Attackers are exploiting user endpoints to get right to the heart of the network. Why mess around with finding a perimeter vulnerability (sure they still exist) when you can own something in the soft chewy center of a network with access to almost everything? While this represents a major, actively exploited attack vector, the industry does not have a comprehensive, repeatable and scaleable solution to test organizations’ susceptibility to these attacks. Until now.

Today we are announcing our new Security-as-a-Service (SaaS) offering:



ThreatSim allows customers to easily run their own advanced attacker simulation campaigns that tests users, user end point devices, network security controls, 3rd party security solutions and incident response plans. ThreatSim answers three critical questions that all organizations should be asking right now:

  1. How can attackers get in?
  2. How do attackers get my data out?
  3. What can we do to prevent it?

The ThreatSim website,, has more details on our new service, including how to sign up to be a beta customer. We will provide more updates here on our blog and via our ThreatSim twitter account, @threatsim. For inquires please email us at or fill out the Request A Demo page on the ThreatSim website.