Data breaches have been on the rise in recent times. Countries in Europe, the US and other parts of the world have put in place […]
Mitigating Windows Print Spooler “PrintNightmare” Vulnerability.
Microsoft has acknowledged the new vulnerability that affects the Windows Print Spooler service, giving attackers leverage to execute remote code with system-level privileges on all […]
Bitcoin-Flashing As a Service (BFaaS)
Nigeria is ranked third most traded cryptocurrency country after the US and Russia. This is due to many factors such as currency sustenance, unemployment, high […]
Can Gig Workers Pose a Hidden Cybersecurity Risk To Your Organization?
What is commonly referred to as the Gig workforce has massively revolutionized global work culture over the last few years, especially in the tech industry […]
How Legacy Systems have become Soft Landing for Threat Actors.
A legacy VPN system gave access to the ransomware gang that breached Colonial Pipeline and made them pay a whooping sum of $4.4 million dollar […]
Defense Evasion – Malware In Bitmap
Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting […]