top of page
About Us
About Us
Blogs & Newsletters
Stay Updated with Our Cybersecurity News and Tips.
![Cyber Attacks During Christmas Holidays](https://static.wixstatic.com/media/db003d_11d22283b2fd4482864c0240e0fe2bfd~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_11d22283b2fd4482864c0240e0fe2bfd~mv2.webp)
Dec 25, 20244 min read
Cyber Attacks During Christmas Holidays
The holidays, marked by celebrations and gift exchanges, also see a rise in cyber threat activity due to increased online activity.
10 views0 comments
![Busting the Top 10 Cybersecurity Myths: What’s Putting Your Business at Risk?](https://static.wixstatic.com/media/db003d_12a8fc8f1e6f4a478f684324a2981dff~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_12a8fc8f1e6f4a478f684324a2981dff~mv2.webp)
Dec 3, 20244 min read
Busting the Top 10 Cybersecurity Myths: What’s Putting Your Business at Risk?
Today, in this fast-moving, technologically surveyed world, the need for cybersecurity has become more inevitable than ever.
8 views0 comments
![Application Lifecycle Management!](https://static.wixstatic.com/media/db003d_b029788c2a5c4510a29a8b5d553d5802~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_b029788c2a5c4510a29a8b5d553d5802~mv2.webp)
Nov 16, 20244 min read
Application Lifecycle Management!
By now, everyone would have realised that cybersecurity is a shared responsibility and requires a layered approach to stay as close as possi
26 views0 comments
![Password Spray activity from Chinese Threat Actors](https://static.wixstatic.com/media/db003d_ff0be3f169054ba3b0da89b6862ac0f8~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_ff0be3f169054ba3b0da89b6862ac0f8~mv2.webp)
Nov 7, 20241 min read
Password Spray activity from Chinese Threat Actors
Based on reports from Microsoft Storm-0940 has been seen using compromised routers to route traffic for their password spray attacks.
12 views0 comments
![Breaking Down CVE-2024-20329: Vulnerability Impact, Exploitation Risks, and How to Stay Secure](https://static.wixstatic.com/media/db003d_36fa03803a2d4e3ab28732209780ed98~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_36fa03803a2d4e3ab28732209780ed98~mv2.webp)
Oct 27, 20242 min read
Breaking Down CVE-2024-20329: Vulnerability Impact, Exploitation Risks, and How to Stay Secure
CVE-2024-20329 is a critical vulnerability in Cisco Adaptive Security Appliance (ASA) software's SSH service.
18 views0 comments
![UNIX CUPS Vulnerability](https://static.wixstatic.com/media/db003d_53ec136207534b7d945dec9196f04fce~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_53ec136207534b7d945dec9196f04fce~mv2.webp)
Oct 21, 20242 min read
UNIX CUPS Vulnerability
CUPS vulnerability discovered in Unix Printing System, which has garnered attention due to its potential for remote code execution (RCE) on
7 views0 comments
![Cryptographic Protocols: A Refresher on SSL, TLS, and Security](https://static.wixstatic.com/media/db003d_1224cbf391054da0b3fedd5b53a4fbab~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_1224cbf391054da0b3fedd5b53a4fbab~mv2.webp)
Oct 17, 20246 min read
Cryptographic Protocols: A Refresher on SSL, TLS, and Security
Hello folks! today, we present a brief refresher on cryptographic protocols to help you brush up on some of the key terms you've likely...
25 views0 comments
![CVE 2024-7965 -An Overview](https://static.wixstatic.com/media/db003d_81a2e17445ab47759aa64ecb698eab1e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/db003d_81a2e17445ab47759aa64ecb698eab1e~mv2.webp)
Sep 15, 20241 min read
CVE 2024-7965 -An Overview
CVE-2024-7965 is the improper Google Chrome browser's implementation of the V8 JavaScript engine.
24 views0 comments
bottom of page