Top

Category: Blog

2018
7 Feb

The first steps towards GDPR compliance are understanding your obligations, what your current processes are and identifying any gaps. Undertaking a data protection audit is essential to achieving compliance. This checklist is intended to provide a starting point, rather than[…]

2017
30 Oct

Today, the best hackers in the world competed in the Global CyberLympics final during Cyber Security Week in The Hague. This is an international online hacking competition aimed at improving the level of national cyber security and strengthening international cooperation[…]

5 Oct

There is no excerpt because this is a protected post.

26 Sep

Why is Ubuntu desktop download (17.04) redirecting me to a supposedly known malicious domain/mirror? Google Safe Browsing recently detected malware on mirror.scalabledns.com. Websites that are normally safe are sometimes infected with malware. Read More: https://transparencyreport.google.com/safe-browsing/search?url=http:%2F%2Fmirror.scalabledns.com%2Fubuntu-releases%2F17.04%2Fubuntu-17.04-desktop-amd64.iso

29 May

Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, we will discuss some basic information, network scanning and advanced techniques covers how to use one of[…]

28 May

The recent WannaCry ransomware attack not only affected computers and billboards but actually impacted human life on a mass scale as hundreds of operations had to be delayed or cancelled. Organisations continue to suffer from external and internal attacks yet[…]

28 May

Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either “sophisticated attackers” or, more blatantly, naming and blaming nation-states like Russia, China and now North Korea (alright, maybe even Iran). The[…]

16 Apr

In particular, one thing that perfectly ties Snowden’s latest documents with this toolkit is a note of tracking an exploit through a 16-character string (ace02468bdf13579) which happens to be found in the code of one exploit from the collection, called[…]

2 Mar

Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How[…]

1 Jan

The rumors of new Alphabet Ransomware virus has gone very high these days. It has infected many computers worldwide. It is a nasty file encryption virus that firstly invade your computer without permission and lock down all your system files[…]