Web applications and software frequently need user interaction to function properly. Users must be able to provide their email addresses and other personal information at […]
2022 | Q2 Report – Lessons Learnt
Our 2022 | Q2 Report takes a look at the #lessons learnt from significant #cyber incidents reported in this quarter, reported CVEs and Threat #Intel and what we can do better […]
Log4j Vulnerability: Impact & Detection
By now, you’ve likely heard of the latest Java-based vulnerability CVE-2021-44228, a critical zero-day vulnerability related to Apache Log4j Java logging library. Affecting everything from […]
Key Elements of Nigeria Data Protection Regulation (NDPR).
Data breaches have been on the rise in recent times. Countries in Europe, the US and other parts of the world have put in place […]
How Legacy Systems have become Soft Landing for Threat Actors.
A legacy VPN system gave access to the ransomware gang that breached Colonial Pipeline and made them pay a whooping sum of $4.4 million dollar […]
Top Breaches of the last 5 years.
Cyberattacks have become a common feature of today’s interconnected world. As more organizations transition their data operations online, the sheer volume of attacks has increased […]