top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


3 min read
What is Qbot / Qakbot
QBot, also known as Qakbot or pinkslipbot, is an information stealer that has been active since 2007. It is malware software that can...


4 min read
An Encounter with Pandora
Pandora ransomware came into the spotlight in March of 2022 after posting some high-profile victims on its leak site. The ransomware...


3 min read
How are your Backups?
Producing and preserving copies of data to safeguard businesses against data loss is referred to as backup and recovery. The data from...


3 min read
Lessons Learned from Conti leaks
A Russian-based Conti Ransomware gang chat leak has started a new debate. The massive chat leak from inside has provided a clearer...


3 min read
5 Reasons you should not pay ransomware attackers
Ransomware is the type of suspicious software Cybercriminals use to encrypt your data, rendering it unusable. As a result, the attackers...


3 min read
What is Incident Response?
Incident response is a method for dealing with various forms of security events, cyber threats, and data breaches in an organized manner....


3 min read
Attacks Target Log4j Bug in VMware
Just over a month after the details of the initial Apache Log4j vulnerability surfaced, attacks against infrastructure running vulnerable...


4 min read
Proxyshell Vulnerabilities
In Microsoft Exchange, the three known vulnerabilities that threat actors use to get initial access are often referred to collectively as...


3 min read
What are Access Controls
Access controls are a security technique that determines who or what may view or utilize resources in a computing environment controlled...


4 min read
How Secure Are Your Passwords?
Strong passwords play an essential role in safeguarding your company's data and client information. Unfortunately, due to weak or...


3 min read
What Is Penetration Testing?
The purpose of penetration testing is to assess an organization's security posture. Penetration testing encompasses all networks,...


3 min read
What is a Vulnerability Assessment?
Assessments of vulnerabilities identify weaknesses, threats, and vulnerabilities in your organization's systems and networks. This...


2 min read
Recently Discovered Attacks
A recent MIT Technology Review Report revealed that 66 zero-day attacks in 2021 were recorded in 2021, nearly double the attacks in 2020....


2 min read
Incident Analysis
Despite the depth of implemented protection measures, cyber incidents are bound to happen at some time. An incident analysis process...


4 min read
Privacy Breaches
2021 has been an interesting year for the information security community. According to the Identity Theft Research Center, the total...


4 min read
Latest Cybersecurity Threats
The year is drawing to an end, and numerous organizations are still reeling from the impacts of various security threats and attacks. For...
bottom of page