Category: Security

Read our latest blog posts

The Shang-Chi Malware Campaign: Is your pirated copy of the summer...

A recent campaign is spreading malware embedded in pirated copies of popular summer blockbusters like Shang-Chi and...

Continue reading

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

Three Quick Wins to Address in an Active Directory Environment

The popularity of Active Directory makes it a juicy target for cyber extortion. Here are some quick...

Continue reading

Digital Brand Protection: A Game-changing Strategy for Online Brand Reputation

Here are some reasons why you should replace your brand monitoring solutions with a digital brand protection...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

A Guide to the Most Popular Zero-Day Attacks

Zero-days are software vulnerabilities that are not known to the developers. Here's a list of the most...

Continue reading

Grappling with COVID-Themed Cyber Attacks: Pharmaceutical Sector

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the...

Continue reading

Analysing Third-Party App Stores for Modded APKs Through Signature Verification

Third-party applications may thus seem innocent, but could in fact be nefarious and have grave implications on...

Continue reading

How Browser Extensions can Exploit User Activities for Malicious Operations

All browser extensions may not be malicious, but they are dangerous. We explain how extensions exploit permissions...

Continue reading

Contemporary Single-Page Applications and Frontend Security

This blog details the build process of Single-Page Applications, and explains how they alter the security implications...

Continue reading