Indicators of Compromise

Indicators of Compromise (IOCs) Explained

An Indicator of Compromise (IOC) is a piece of digital forensic evidence that…


Managed Detection and Response

Choosing the Right Managed Detection and Response (MDR) Vendor

Managed Detection and Response services provide businesses with access to…


Elon Musk

Elon Musk Makes Twitter Take Down SMS 2FA

The two-factor authentication (2FA) notification outage happened after CEO…


Black Friday Scams

Top 5 Black Friday Scams and How to Avoid Them in 2022

Black Friday is one of the biggest retail sales days, with deals on…


WordPress Websites Hacked

15,000 WordPress Websites Hacked as part of Massive Google SEO Poisoning Scheme

15,000 WordPress Websites Hacked according to Sucuri, the first to notice the…


Canadian Hacker Sentenced to 20 Years in Prison

Canadian Hacker Sentenced to 20 Years in Prison in Connection to NetWalker Ransomware

Canadian Hacker Sentenced to 20 Years in Prison by a U.S. court for his…


Windows Update

ALERT: Windows Update Patches Six Active Zero-Day Vulnerabilities

Microsoft’s most recent monthly security updates included remedies for…


Update for Chrome

ALERT: Google Releases Immediate Update for Chrome to Fix Actively Exploited Zero-Day Vulnerability

Google released emergency Update for Chrome web browser on Thursday to patch…


Dangers of Storing Passwords

The Dangers of Storing Passwords in Your Computer and What to do About It

Do you or your coworkers keep passwords in an Excel sheet, Word document or…


Sliver C2

Hackers are Moving to Sliver C2 as an Alternative to Cobalt Strike

Threat actors are abandoning the Cobalt Strike suite in favour of a…