What-is-the-Chamois-Botnet

What is the Chamois Botnet?

In March 2017 the Android security team had detected, analysed and eliminated a sophisticated botnet which was built on compromised apps that work together to power ad and SMS fraud.…

Read more
password

How to Create a Strong Secure Password & How to Keep Your Password Safe?

In this day and age the internet is an integral part of our lives. Everything we do can be found online from banking to healthcare and can be found on…

Read more
Lace-Tempest.

Who are Lace Tempest?

The on going attack of Progress Software MOVEit Transfer applications has been attributed by Microsoft to Lace Tempest. The Microsoft threat intelligence team has been quoted as follows: "Exploitation is…

Read more
Properly-Dispose-of-Your-Mobile-Devices

How to Properly Dispose of Your Mobile Devices

Mobile devices from smartphones, watches and tablets continue to advance at rapid rate. One may replace their devices as often as once a year. What one doesn't realize is just…

Read more
🚨 Major Azure Portal 🔌 Outage 9th June 2023.

Major Azure Portal Outage 9th June 2023

On 9th of June 2023 Microsoft reported on the Azure Status page, that the preliminary root cause behind an outage that impacted the Azure Portal globally was described as a…

Read more
It’s competition week at EagleEye Technology!

✌️ It’s competition week at EagleEye Technology!

🎉 Get ready for competition week at EagleEye Technology! This is your chance to win a fantastic prize—a Logitech Zone wired Headphones worth €115! These high-quality headphones feature premium audio…

Read more
3cx Breach Involved a 10 Year Old windows Bug with an Opt In Fix

3cx Breach Involved a 10 Year Old windows Bug with an Opt In Fix

In some shocking news it has been discovered that the 3cx attack occurred due to a 10 year old Windows vulnerability which is still actively exploited in attacks which make…

Read more
MOVEit Hack

Progress Software’s MOVEit Hack Allows Big Names To Be Hacked

MOVEit is a piece of software which runs either in the cloud or on premises that provides a secure means to share sensitive information and is fully auditable. This software…

Read more

The paramount importance of vulnerability management

Vulnerability management is the ongoing process of identifying, assessing, prioritizing, mitigating & monitoring computer systems, networks and software. It is of paramount important in ensuring a strong security posture for…

Read more