top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


3 min read
CVE-2023-27350 PaperCut and Bl00dy Ransomware Gang
The vulnerability CVE-2023-27350 enables remote actors to sidestep authentication and execute remote code on several versions of PaperCut...


2 min read
Phishing Attacks and Social Engineering: Recognizing the Signs and Preventing Exploitation
In today's digitally connected world, cybersecurity is no longer optional—it's a necessity. At Inception Security, we know that the only...


3 min read
The Human Factor in Cybersecurity: Best Practices for Employee Training and Awareness
In the rapidly evolving digital landscape, cybersecurity is paramount for businesses of all sizes. While organizations invest heavily in...


3 min read
Understanding the Dark Web: What Every Business Owner Needs to Know
The Dark Web can be daunting and mysterious, often associated with criminal activity and hidden dangers. As a business owner, it's...


2 min read
Top 5 Reasons to Invest in a BEC Assessment for Your Business
In today's fast-paced digital world, businesses face numerous cybersecurity threats. One of the most prevalent and financially damaging...


3 min read
7 Reasons Why Businesses Need TableTop Exercises
Top Reasons Why Incident Response Table Top Exercises Are Important In today's digital world, cyber threats are becoming more...


3 min read
5 Reasons Why Risk Assessments are Important for Businesses
In today's digital age, cybersecurity threats are on the rise, and it's more important than ever for businesses to take proactive...


2 min read
Understanding ManageEngine Vulnerability CVE-2022-47966
ManageEngine's CVE-2022-47966 vulnerability is a critical issue that allows an attacker to gain remote code execution on the server...


2 min read
Understanding the Exchange Server Attacks: Exploiting CVE-2022-41040 and CVE-2022-41082
In recent months, we have seen a surge in attacks targeting Exchange Servers. These attacks have been made possible by exploiting the...


3 min read
Play Ransomware Group
The Play ransomware group has been making headlines recently due to its use of a new method to exploit vulnerabilities in Microsoft...


3 min read
Citrix CVE-2022-27518
Citrix is a global leader in providing digital workspace solutions, and as such, it is a popular target for cyber attackers. One such...


2 min read
Citrix CVE-2022-27516
CVE-2022-27516 is a severe vulnerability recently discovered in Citrix, a widely-used software program. This vulnerability has the...


2 min read
Fortinet CVE-2022-42475
CVE-2022-42475 is a recently discovered vulnerability in the software that powers Fortinet, a popular cybersecurity company. This...


2 min read
Forensic Friday - Jump Lists
What are Jump Lists? Jump Lists are windows features introduced with Windows 7, and they contain information about recently accessed...


2 min read
Remote Assistance Tools - T1219
Let's talk about remote assistance tools! As you would expect, a remote assistance tool is used to assist end-users from a remote...


3 min read
Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....


3 min read
Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...


3 min read
Cyber Insurance Benefits
What is Cyber Insurance? A cyber insurance policy is commonly called "cyber risk insurance" or "cyber liability insurance" coverage. It...


3 min read
Forensic Friday - Profile Lists
What are Profile Lists? Windows keeps track of user-profiles and their locations in the registry. The profile location is stored under...


3 min read
CVE-2022-1388 (F5 BIG-IP)
CVE-2022-1388 is a critical CVE (CVSS 9.8) in F5 Networks’ BIG-IP solution management interface. This CVE will allow threat actors to...
bottom of page