log4shell Vulnerability Assessment and How to Fix itThe Apache Software Foundation has released fixes to contain an actively exploited zero-day vulnerability affecting the widely-used Apache…Dec 12, 2021Dec 12, 2021
Types of Social Engineering AttacksMost cybercriminals are master manipulators, but that doesn’t mean they’re all manipulators of technology — some cybercriminals favor the…Nov 21, 2021Nov 21, 2021
Receiving spam in Google Drive Mobile app notifications via “mentions”Specially Affecting: Users on Android DevicesNov 7, 2021Nov 7, 2021
CISSP: Not as difficult as they want you to thinkYou may have stumbled upon this article or your friend/aquaintance would have referred you to this. Not so important. The important part is…Jun 29, 2021Jun 29, 2021
10 things you can do after you are hit by a Ransomware?Alright! now you know that those articles, news channel reports and security experts blabbering on LinkedIn posts were not kiddin. This…Jun 10, 20211Jun 10, 20211
Fake Copyright Infringement Warnings with Googlesites URL being Used to Spread RansomwareRansomwares can be dreadful. It is one of the topics that gives sleepless nights to many businesses. A ransomware attack can lead to huge…May 25, 20211May 25, 20211