InQuest is excited to announce the Breach and Attack Simulation E-mail Assessment.

To validate an e-mail security stacks capability in blocking current real-world threats harvested from the wild. InQuest harvests unique malware daily and validates the detection efficacy of the common cloud e-mail providers (GSuite, O365).

Collectively, the default security stacks offered by the providers are capable of detecting between 85% and 95% of these novel attacks. The samples capable of bypassing these stacks are candidates for the InQuest E-mail Security Assessment.

Contact us If you would like to know more about the BAS E-mail Assessment

Latest InQuest™ Blog Posts

InQuest Labs Year in Review

Posted on 2020-09-29 by Chris Morrow

InQuest Labs is one year old! Let's take a look at how the site grew over the last year, the new API documentation, and what's in store for the future of Labs!

Read more

A modern take on the movie Hackers

Posted on 2020-09-14 by Nikolay Pankov (Kaspersky)

To mark the film’s 25th anniversary, we examine Hackers in terms of modern information security.

While not an InQuest blog, Hackers is undoubtedly one of our favorite films. This recent analysis and the anniversary deserve to be shared! Read more
InQuest™ Labs Research Spotlight

rtfsig

This tool is designed to make it easy to signature potentially unique parts of RTF files. This will scan the file for potentially unique RTF tags, print details to screen, and save a Yara rule to output.yar.

Read more

Ciphey

Ciphey aims to be a tool to automate a lot of decryptions & decodings such as multiple base encodings, classical ciphers, hashes, or more advanced cryptography.

Read more

VT Code Similarity Yara Generator

This Yara generator is using VirusTotal 'code-similar-to:' beta search modifier to gather code blocks from PE files and automatically create a Yara signature using them.

Read more
Global Security Events

UHS hospitals hit by reported country-wide Ryuk ransomware attack

Universal Health Services (UHS), a Fortune 500 hospital and healthcare services provider, has reportedly shut down systems at healthcare facilities around the US after a cyber-attack that hit its network during early Sunday morning.

Read more

Windows XP Source Code Got Leaked All Over the Internet

Windows XP's refusal to die has caused a multitude of security problems. Microsoft stopped officially providing updates to the operating system in 2014, meaning any vulnerabilities largely don't get fixed on the millions of computers that still run it.

Read more

Surveillance Company Explains How to Keep Facebook From Detecting Fake Accounts in Leaked Manual

A leaked manual from Blackdot Solutions, a British company that offers social media monitoring services, included a step-by-step guide on how to create fake profiles on Facebook and LinkedIn.

Read more
InQuest™ Insider - Your monthly resource for the latest in cyber security news, trends, tips and tools. Subscribe here.
Copyright © InQuest™ 2020