Indicators of Compromise (IOCs) Explained
An Indicator of Compromise (IOC) is a piece of digital forensic evidence that…
Choosing the Right Managed Detection and Response (MDR) Vendor
Managed Detection and Response services provide businesses with access to…
Elon Musk Makes Twitter Take Down SMS 2FA
The two-factor authentication (2FA) notification outage happened after CEO…
Top 5 Black Friday Scams and How to Avoid Them in 2022
Black Friday is one of the biggest retail sales days, with deals on…
15,000 WordPress Websites Hacked as part of Massive Google SEO Poisoning Scheme
15,000 WordPress Websites Hacked according to Sucuri, the first to notice the…
Canadian Hacker Sentenced to 20 Years in Prison in Connection to NetWalker Ransomware
Canadian Hacker Sentenced to 20 Years in Prison by a U.S. court for his…
ALERT: Windows Update Patches Six Active Zero-Day Vulnerabilities
Microsoft’s most recent monthly security updates included remedies for…
ALERT: Google Releases Immediate Update for Chrome to Fix Actively Exploited Zero-Day Vulnerability
Google released emergency Update for Chrome web browser on Thursday to patch…
The Dangers of Storing Passwords in Your Computer and What to do About It
Do you or your coworkers keep passwords in an Excel sheet, Word document or…
Hackers are Moving to Sliver C2 as an Alternative to Cobalt Strike
Threat actors are abandoning the Cobalt Strike suite in favour of a…