top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


3 min read
7 Reasons Why Businesses Need TableTop Exercises
Top Reasons Why Incident Response Table Top Exercises Are Important In today's digital world, cyber threats are becoming more...


3 min read
5 Reasons Why Risk Assessments are Important for Businesses
In today's digital age, cybersecurity threats are on the rise, and it's more important than ever for businesses to take proactive...


3 min read
Citrix CVE-2022-27518
Citrix is a global leader in providing digital workspace solutions, and as such, it is a popular target for cyber attackers. One such...


2 min read
Citrix CVE-2022-27516
CVE-2022-27516 is a severe vulnerability recently discovered in Citrix, a widely-used software program. This vulnerability has the...


2 min read
Fortinet CVE-2022-42475
CVE-2022-42475 is a recently discovered vulnerability in the software that powers Fortinet, a popular cybersecurity company. This...


2 min read
Forensic Friday - Jump Lists
What are Jump Lists? Jump Lists are windows features introduced with Windows 7, and they contain information about recently accessed...


2 min read
Remote Assistance Tools - T1219
Let's talk about remote assistance tools! As you would expect, a remote assistance tool is used to assist end-users from a remote...


3 min read
Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....


3 min read
Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...


3 min read
Forensic Friday - Profile Lists
What are Profile Lists? Windows keeps track of user-profiles and their locations in the registry. The profile location is stored under...


3 min read
CVE-2022-1388 (F5 BIG-IP)
CVE-2022-1388 is a critical CVE (CVSS 9.8) in F5 Networks’ BIG-IP solution management interface. This CVE will allow threat actors to...


3 min read
Forensic Friday - Prefetch
What is Windows Prefetch? Windows Prefetch creates files when a user opens an application on a Windows host. The Windows Operating system...


3 min read
Emotet Changing Techniques
Phishing attacks remain the number one technique used in cyberattacks. Some of the most common phishing attacks leveraged attachments to...


1 min read
Cyberattacks On The Rise
As we look across the landscape, we see that cyberattacks continue to succeed in all business sectors. In the cases we have observed, the...

3 min read
Benefits of a vCISO
Flexibility: A virtual Chief Information Security Officer (vCISO) can be reached immediately via a simple phone call, whether the vCISO...


3 min read
Lessons Learned from Conti leaks
A Russian-based Conti Ransomware gang chat leak has started a new debate. The massive chat leak from inside has provided a clearer...


3 min read
What is Incident Response?
Incident response is a method for dealing with various forms of security events, cyber threats, and data breaches in an organized manner....


3 min read
Attacks Target Log4j Bug in VMware
Just over a month after the details of the initial Apache Log4j vulnerability surfaced, attacks against infrastructure running vulnerable...


4 min read
How Secure Are Your Passwords?
Strong passwords play an essential role in safeguarding your company's data and client information. Unfortunately, due to weak or...


2 min read
Recently Discovered Attacks
A recent MIT Technology Review Report revealed that 66 zero-day attacks in 2021 were recorded in 2021, nearly double the attacks in 2020....
bottom of page