Security Awareness Training: What It Is and Why You Need It
Security Awareness Training and Education (SATE) is essential for businesses to keep up with the dynamic nature of current cybersecurity threats. We’ll work with you to develop a curriculum that is personalized to your requirements. More important this is a “living” program that you own, with well-defined metrics that continue to show your successes.
Tips to Have a Cyber-Safe Holiday Season
Every time you get an e-mail, text message, or phone call that seems to feel extra urgent, take a pause and think whether it really applies to you. And maybe you can validate that message some other way, instead of clicking on the link provided.
Mariner co-founder Gerry Pond Inaugural Inductee to InnovateNB Hall of Fame
In many ways, the essence of the InnovateNB Hall of Fame is a celebration reflecting a purpose we embrace at Mariner. Who we are and the aspirations we have as an organization for talented people and the communities we serve – to innovate, always and everywhere for change that matters.
Technique of the Week: Accessing Insecure Cloud Storage
Cybersecurity Awareness Month is here and in celebration, the Mariner Vulnerability Assessment and Penetration Testing team are showcasing some of their favorite hacking techniques. Each week in October, they will explain a vulnerability, demonstrate how they might...
Technique of the Week: Bypassing Multi-Factor Authentication in Phishing Attacks
Cybersecurity Awareness Month is here and in celebration, the Mariner Vulnerability Assessment and Penetration Testing team are showcasing some of their favorite hacking techniques. Each week in October, they will explain a vulnerability, demonstrate how they might...
Technique of the Week: Cracking Wireless Networks
Wireless networks are one of the most common avenues threat actors will take to gain access to your internal systems. Once breached, wireless networks often offer attackers a valuable foothold to pivot onto other networks in your organization, jumping from host to host until your entire environment is compromised. This week’s article is going to examine how the 4-way handshake for Wireless Lan (WLAN) communication works, how an attacker might compromise that process, and how to improve your wireless security posture.
Technique of the Week: SQL Code Injection
SQL Injection, also known simply by SQLi, is likely one of the most discussed and well-known attacks to applications, even more so in the context of web applications. Even though it was first publicly discussed late 1990s (Phrack Magazine #54), SQLi is quite often misunderstood and still present in applications today.
Technique of the Week: Stealing User Credentials with Open Redirects
Open redirect vulnerabilities are often viewed as a lower severity class of vulnerability, as they typically aren’t a vector that threat actors can use to attack a web application directly. However, under the right circumstances, threat actors can leverage these seemingly benign open redirects to steal user credentials by introducing an element of social engineering to the mix.
NSBI supports Mariner in local job creation
Halifax, Nova Scotia - Nova Scotia Business Inc. (NSBI) has approved a business development incentive in the form of a payroll rebate for Mariner Partners Inc., a wholly owned subsidiary of Mariner Group Inc. Founded in New Brunswick in 2003, Mariner is a technology...
Cybersecurity Fundamentals: What is an OWASP MASVS Assessment?
One of the most common instances in which you might want an OWASP MASVS assessment is when you are developing a commercial mobile application. The results of a MASVS assessment can be used to show potential users and auditors how your application stacks up against a universally accepted standard.