In late 2019 and early 2020 Maze Ransomware started its surge in attacks, but what is Maze ransomware, and how…
Authority When a threat actor conveys authority as part of their social engineering, it could be from someone higher in…
• Social engineering Phishing Phishing is a method that attackers use in which they will send emails to a user,…
Viruses Viruses are a specific piece of malware which replicates itself to further infect other devices, file systems and shares.…
Insecure Deserialization Insecure Deserialization is when unknown or manipulated object is injected into a web application. This could be SQL…
Does using a password manager really make you safer? There always seems to be a lot of mixed opinions on…
Reverse shells are one of the best ways to connect back to your attacking machine via remote code execution. First…
Stalkerware is essentially spyware for an individual person, it is most commonly used by someone close to you, with that…
Using Components with known vulnerabilities This one is a lot more specific to application or website development; using components with…
Insufficient logging and monitoring According to the OWASP organisation, the average time it takes for a breach to be detected…