top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


3 min read
Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....


3 min read
Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...


4 min read
Business Continuity and Disaster Recovery
Business continuity and disaster recovery (BCDR or BC/DR) is a collection of processes and procedures that assist a company in recovering...


3 min read
Emotet Changing Techniques
Phishing attacks remain the number one technique used in cyberattacks. Some of the most common phishing attacks leveraged attachments to...


1 min read
Cyberattacks On The Rise
As we look across the landscape, we see that cyberattacks continue to succeed in all business sectors. In the cases we have observed, the...


3 min read
Attack Surface Management
Considering today's attack surface's massive and hyper-dimensional nature, we begin to see how challenging it is to manage this attack...


4 min read
An Encounter with Pandora
Pandora ransomware came into the spotlight in March of 2022 after posting some high-profile victims on its leak site. The ransomware...


3 min read
What is Incident Response?
Incident response is a method for dealing with various forms of security events, cyber threats, and data breaches in an organized manner....


3 min read
Attacks Target Log4j Bug in VMware
Just over a month after the details of the initial Apache Log4j vulnerability surfaced, attacks against infrastructure running vulnerable...


3 min read
What is a Vulnerability Assessment?
Assessments of vulnerabilities identify weaknesses, threats, and vulnerabilities in your organization's systems and networks. This...


2 min read
Recently Discovered Attacks
A recent MIT Technology Review Report revealed that 66 zero-day attacks in 2021 were recorded in 2021, nearly double the attacks in 2020....


4 min read
Latest Cybersecurity Threats
The year is drawing to an end, and numerous organizations are still reeling from the impacts of various security threats and attacks. For...
bottom of page