top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


What is Qbot / Qakbot
QBot, also known as Qakbot or pinkslipbot, is an information stealer that has been active since 2007. It is malware software that can...
3 min read


An Encounter with Pandora
Pandora ransomware came into the spotlight in March of 2022 after posting some high-profile victims on its leak site. The ransomware...
4 min read


How are your Backups?
Producing and preserving copies of data to safeguard businesses against data loss is referred to as backup and recovery. The data from...
3 min read


Lessons Learned from Conti leaks
A Russian-based Conti Ransomware gang chat leak has started a new debate. The massive chat leak from inside has provided a clearer...
3 min read


5 Reasons you should not pay ransomware attackers
Ransomware is the type of suspicious software Cybercriminals use to encrypt your data, rendering it unusable. As a result, the attackers...
3 min read


What is Incident Response?
Incident response is a method for dealing with various forms of security events, cyber threats, and data breaches in an organized manner....
3 min read


Attacks Target Log4j Bug in VMware
Just over a month after the details of the initial Apache Log4j vulnerability surfaced, attacks against infrastructure running vulnerable...
3 min read


Proxyshell Vulnerabilities
In Microsoft Exchange, the three known vulnerabilities that threat actors use to get initial access are often referred to collectively as...
4 min read


What are Access Controls
Access controls are a security technique that determines who or what may view or utilize resources in a computing environment controlled...
3 min read


How Secure Are Your Passwords?
Strong passwords play an essential role in safeguarding your company's data and client information. Unfortunately, due to weak or...
4 min read


What Is Penetration Testing?
The purpose of penetration testing is to assess an organization's security posture. Penetration testing encompasses all networks,...
3 min read


What is a Vulnerability Assessment?
Assessments of vulnerabilities identify weaknesses, threats, and vulnerabilities in your organization's systems and networks. This...
3 min read


Recently Discovered Attacks
A recent MIT Technology Review Report revealed that 66 zero-day attacks in 2021 were recorded in 2021, nearly double the attacks in 2020....
2 min read


Incident Analysis
Despite the depth of implemented protection measures, cyber incidents are bound to happen at some time. An incident analysis process...
2 min read


Privacy Breaches
2021 has been an interesting year for the information security community. According to the Identity Theft Research Center, the total...
4 min read


Latest Cybersecurity Threats
The year is drawing to an end, and numerous organizations are still reeling from the impacts of various security threats and attacks. For...
4 min read
bottom of page