| Aug 9, 2022 Ransomware Lifecycle Attack Ransomware attacks have become increasingly more common. Learn about the lifecycle of a ransomware attack and how you can prevent one.
| Jul 6, 2022 Google Chrome Zero-Day Vulnerability Exploit [CVE-2022-2294] Over the 4th of July weekend, Google released a patch for a high-severity zero-day Chrome vulnerability. Learn everything you need to know in our blog.
| May 18, 2022 CVE-2022-1040: Critical Sophos Firewall RCE Vulnerability CVE-2022-1040 is an authentication bypass vulnerability located in the User Portal and Webadmin areas of Sophos Firewall. Learn more!
| Apr 14, 2022 What's Quantum Computing Got to do With It? Today, we still hear about quantum computing + how it will break the current encryption methods on which we depend to secure and store data. To understand this threat, we need to understand how our current methods work.
| Apr 1, 2022 VMware's Spring Boot Vulnerabilitiy & Exploit [CVE-2022-22965] A zero-day remote code execution (RCE) vulnerability (CVE-2022-22965) was found in VMware’s Spring Framework. Learn how to protect yourself.
| Mar 31, 2022 How to Detect Ransomware: Best Practices for Avoiding Malware Attacks The best defense against ransomware is by understanding how ransomware works and how to effectively use mechanisms that detect it early.
| Mar 18, 2022 What Is Penetration Testing (Not All Pen Tests Are Created Equal) The goal of a penetration test is to answer the question: Are we secured? Can we withstand social engineering or other attacks? Learn more!
| Mar 17, 2022 CaddyWiper Malware Vs RURansom Wiper (The Cyber War Continues) CaddyWiper, a data wiping malware, is targeting Ukrainian networks; while RURansom, which is also a wiper despite its name, is targeting Russian networks.
| Feb 24, 2022 Cyber Threat Hunting & Workflow (Prevent Cyber Attacks) Cyber threat hunting is a proactive security strategy that searches through networks to detect & isolate advanced threats before they present themselves.
| Jan 19, 2022 Cybersecurity Best Practices & Principles [Updated 2022] In order to use more sophisticated cyber security tools & techniques, organizations need to have a decent understanding of cybersecurity best practices.