Cybersecurity

Vendor-Security-Best-Practices

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security Best Practices

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Vendor-Security

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Highest-Levels-Of-Cyber-Attacks

Education & Research Sector Sees Highest Levels Of Cyber Attacks

With the education and research sectors being the early adopters of digital platforms for delivery of course material and conducting exams, digital transformation has been an on going process for…

Read more
Exfiltrated-In-Hack

All Of Okta’s Client Data Exfiltrated In Hack

Okta has admitted that it has greatly messed up when investigating last month's hack. It failed to pick up that 99% of its data had been exfiltrated by threat actors.…

Read more
Okta 2fa

Okta Hacked Again As a 2FA Company Fails To Enforce 2FA

Okta is back in the headlines, this time due to not implementing 2FA for employee accounts. 2FA is something that is a crucial must have today and for all accounts…

Read more
GPS Spoofing: Aircraft Being Hacked When Flying Over The Middle East

GPS Spoofing, Aircraft Being Hacked When Flying Over The Middle East

In recent and alarming developments, dozens of commercial flights that are flying over parts of the Middle East reporting experiencing GPS spoofing attacks in recent months. Such attacks deal with…

Read more
Tor-Project

Tor Project Removes Relays Due to For Profit Risky Activity

The tor project explained why a number of network relays were removed citing that they represented a threat to the safety & security of all Tor network users. The tor…

Read more
Tirada-Malware

Dissecting The Tirada Malware Trojan

Trojans are similar to that of armies and actually behave in the same way. Armies usuallly send out the scouts first to survey the area and ensure all is ok.…

Read more

3 Hacking Tools Exposed – Rubber Duckies

Malicious threat actors have a deadly arsenal of tactics that can be used to breach your companies defenses and cause a lot of harm for a business and their clients.…

Read more

3 Hacking Tools Exposed – Bash Bunny

Malicious threat actors have a deadly arsenal of tactics that can be used to breach your companies defenses and cause a lot of harm for a business and their clients.…

Read more