What is Cyber Warfare?

What with the current news around the events in Iran, the security level has been raised across most of the western world. With the heightened security levels, we can also expect cyber attacks from nation state actors based in Iran and the middle east on western infrastructure. This blog has been in my backlog for... Continue Reading →

A Review of 2019

What a difference 365 days makes. 2019 has been an eventful year for cyber security professionals with a number of new threats emerging as well as an escalation in ransomware and level of data breaches as well as all the normal threat vectors. IoT has also featured heavily in the cyber security landscape. But first... Continue Reading →

Domain Typo Squatting

I would like you to take a look at the following web address: What do you see? Do you see microsoft.com? You would be very wrong if you did. Zoom in on the above picture. This address is actually RNICROSOFT.COM and not the address you first thought of. UNDER NO CIRCUMSTANCES GO TO ANY ON... Continue Reading →

Malware 101 – A Pocket Guide

This post is a general round up of the various types of malware that is in circulation today. Typical types of malware are: BackdoorsFile-less MalwareKey Loggers Ransom Ware Root Kits Trojan HorsesViruses WipersWorms. This can also include social engineering methods, which are often used to get the first foothold in installing some form of malware.... Continue Reading →

Malware as a Service (MaaS)

In the era of cloud computing, where we see all forms of online services provided for a subscription, it is probably not surprising that we see dark net services providing malware as a service. While not necessarily something most of us would want to subscribe to, there are dark web sites that provide forms of... Continue Reading →

Create a website or blog at WordPress.com

Up ↑