Cybersecurity

Banner HTML

HTML misused in a malicious manner

HTML, or Hyper Text Markup Language, has been misused by malicious threat actors for years. In a report published by Barracuda, it was observed that roughly 21% of the HTML…

Read more
Threat advisory

Threat Advisory – Critical PaperCut vulnerability being actively exploited

What is PaperCut MF & MG? PaperCut is a piece of software that allows one to manage and minimize printer waste as well as print in a sensitive documents in…

Read more
Threat Advisory EvilExtractor Malware Spikes In Europe and US

Threat Advisory – EvilExtractor Malware Spikes In Europe and US

Distributed through phishing campaigns, EvilExtrator malware attacks have increased in both Europe and the US. This malware can harvest different types of data, including ones browser history, passwords, and cryptocurrency…

Read more
How to report a security vulnerability responsibily

How To Report A Security Vulnerability Responsibly

Proper disclosure of vulnerabilities is crucial to ensure hackers do not start to exploit end users using the vulnerability in question. It is important that when a vulnerability is found it…

Read more

Opinion: Cybersecurity for everyone

Cybersecurity companies mainly focus on large enterprises. This leaves those residential clients, micro, small and medium enterprises potentially not able to afford proper cybersecurity solutions. It is rather unfair that cyber…

Read more

What is DMARC?

DMARC, or Domain Based Message Authentication, Reporting & Conformance, is a way to authenticate email messages originating from ones own domain. This improves deliverability, as well as increases domain reputation but…

Read more
Critical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked

Critical Zero Day Vulnerability in Chrome Can Allow Your Device To Be Hijacked

Google is urging users to immediately update chrome due to a critical zero day vulnerability that would allow your device to be hijacked. This security flaw currently in the wild,…

Read more
5 warning signs of a phishing email

Signs To Watch Out For If You Suspect An Email To Be A Phishing Email

One of the many types of cyber crimes that are used by malicious threat actors is that of phishing. Phishing usually targets one or more individuals by email, telephone or…

Read more
Who are the Hacking Group Labyrinth Collima

Who are the hacking group LABYRINTH CHOLLIMA

Labyrinth Chollima, active since at least 2018 and originating from North Korea and also known as APT37 has been linked to the North Korean Government. (more…)

Read more
Alert: 3CX Compromised

Alert: 3CX Compromised

On 29th March 2023, the popular VoIP communications system used by businesses worldwide, 3CX, has reportedly been targeted in a supply chain attack. A digitally signed legitimate version of the…

Read more