top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


3 min read
Understanding the Mockingjay Malware
Cybersecurity is a lot like a game of chess. You must anticipate your opponent's moves and devise strategies to stop them. But what...


3 min read
Understanding and Mitigating the MOVEit Transfer CVE-2023-34362 Vulnerability
On May 31, 2023, Progress released a security advisory for their MOVEit Transfer application detailing a SQL injection vulnerability...


3 min read
7 Reasons Why Businesses Need TableTop Exercises
Top Reasons Why Incident Response Table Top Exercises Are Important In today's digital world, cyber threats are becoming more...


3 min read
5 Reasons Why Risk Assessments are Important for Businesses
In today's digital age, cybersecurity threats are on the rise, and it's more important than ever for businesses to take proactive...


3 min read
Play Ransomware Group
The Play ransomware group has been making headlines recently due to its use of a new method to exploit vulnerabilities in Microsoft...


2 min read
Forensic Friday - Jump Lists
What are Jump Lists? Jump Lists are windows features introduced with Windows 7, and they contain information about recently accessed...


3 min read
Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...


3 min read
CVE-2022-1388 (F5 BIG-IP)
CVE-2022-1388 is a critical CVE (CVSS 9.8) in F5 Networks’ BIG-IP solution management interface. This CVE will allow threat actors to...


3 min read
Forensic Friday - Prefetch
What is Windows Prefetch? Windows Prefetch creates files when a user opens an application on a Windows host. The Windows Operating system...


3 min read
Spring4Shell
A critical vulnerability CVE-2022-22965 (Spring4Shell or SpringShell) was found on March 29, 2022, in an open-source Java framework while...


3 min read
Lessons Learned from Conti leaks
A Russian-based Conti Ransomware gang chat leak has started a new debate. The massive chat leak from inside has provided a clearer...


3 min read
Attacks Target Log4j Bug in VMware
Just over a month after the details of the initial Apache Log4j vulnerability surfaced, attacks against infrastructure running vulnerable...


4 min read
Proxyshell Vulnerabilities
In Microsoft Exchange, the three known vulnerabilities that threat actors use to get initial access are often referred to collectively as...


3 min read
What are Access Controls
Access controls are a security technique that determines who or what may view or utilize resources in a computing environment controlled...


2 min read
Recently Discovered Attacks
A recent MIT Technology Review Report revealed that 66 zero-day attacks in 2021 were recorded in 2021, nearly double the attacks in 2020....


2 min read
Incident Analysis
Despite the depth of implemented protection measures, cyber incidents are bound to happen at some time. An incident analysis process...


4 min read
Privacy Breaches
2021 has been an interesting year for the information security community. According to the Identity Theft Research Center, the total...


4 min read
Latest Cybersecurity Threats
The year is drawing to an end, and numerous organizations are still reeling from the impacts of various security threats and attacks. For...
bottom of page