Introduction According to Cybersixgill, each day they collect approximately 10 million intelligence data from the deep, dark, and clear web. Thereby, tracking the pulse of […]
Cobalt Strike Abuse And The Fight Against It
Just last week Microsoft’s DCU, Fortra and Health-ISAC moved to go legal and technical to disrupt cracked, legacy copies of Cobalt Strike and abused Microsoft […]
Incident Reporting – A Major Concern in the Africa CyberThreat Assessment Report 2023 by Interpol.
Having taken a thorough look at the African Cyberthreat Assessment Report 2023 by Interpol’s African Cybercrime Operations Desk with data drawn from Interpol’s member countries […]
2023 | Q1 Report – Incident reports, Major CVEs & Threat Intel
Here is our 2023 Q1 Report speaking to incident reports, major CVEs and threat intel as captured in the first 3 months of 2023. Capturing […]
How Scammers Are Frustrating Vulnerability Disclosure for Cyber Researchers!
How would you react if you found this in your company inbox? You may want to ignore and many will take the fear bait and […]
What You Get When Input Validation is Missing – Shells, Miner & More
Web applications and software frequently need user interaction to function properly. Users must be able to provide their email addresses and other personal information at […]