API security is a crucial aspect of any organization’s digital strategy, but it can be challenging to implement and maintain. In this blog post, we […]
Category: Security Assessment
Comparing CVSS and EPSS: Addressing CVSS Problems with EPSS
What is CVSS? CVSS, or the Common Vulnerability Scoring System, can be viewed as the weather forecast for cybersecurity professionals. CVSS a free and open […]
Highlights of Google Report: The Ups and Downs of 0-days
Introduction: Executive Summary Google’s Threat Analysis Group presents a comprehensive review of 0-days exploited in-the-wild during 2022. A total of 41 in-the-wild 0-days were detected […]
Incident Reporting – A Major Concern in the Africa CyberThreat Assessment Report 2023 by Interpol.
Having taken a thorough look at the African Cyberthreat Assessment Report 2023 by Interpol’s African Cybercrime Operations Desk with data drawn from Interpol’s member countries […]
NDPR’s Technical Requirements for Organizations to Ensure Data Privacy – DPW2023
The Nigeria Data Protection Regulation (NDPR), enacted in 2019, contains a number of clauses that companies must follow in order to ensure the best possible […]
Bypassing AV with Hoaxshell – Windows Defenders
T3l3machu recently released Hoaxshell and Villain, both of which are excellent tools that easily make it to our red team operations arsenal. What makes these […]