• Facebook
  • Twitter
  • Instagram
  • Youtube
  • LinkedIn
Recent Post
  • CLOUD SECURITY THREAT (a serious business plaque) 
  • SECURITY BREACHES OF REMOTE WORKING
  • Why You Should Avoid Public Wi-Fi (Wireless Fidelity)
  • Kerboroasting Attack
  • Why do your Email go to spam?
  • About Us
  • Solutions
  • Industries
  • Resources
  • Careers
  • blog

Olarewaju Akeju

25 posts
CCybersecurity
Read More
  • 3 minute read

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

  • byOlarewaju Akeju
  • July 21, 2022
In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back…
CCybersecurity
scams
Read More
  • 3 minute read

Text-based fraud: from 419 scams to vishing

  • byOlarewaju Akeju
  • July 18, 2022
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But…
CCybersecurity
ransomware attacks
Read More
  • 7 minute read

WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

  • byOlarewaju Akeju
  • July 18, 2022
INTRODUCTION TO RANSOMWARE   RANSOMWARE is a particular class of malwares that demands payment in exchange for a stolen functionality,…
DDisaster Recovery & Business Continuity
Read More
  • 4 minute read

APT ToddyCat

  • byOlarewaju Akeju
  • July 14, 2022
Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia ToddyCat is a relatively new APT…
GGeneral ICT
corporate infrastructure
Read More
  • 2 minute read

How much does access to corporate infrastructure cost?

  • byOlarewaju Akeju
  • July 14, 2022
In contrast, less experienced cybercriminals are not always able to see an attack through to the end (malware…
DDisaster Recovery & Business Continuity
Read More
  • 4 minute read

The SessionManager IIS backdoor

  • byOlarewaju Akeju
  • July 14, 2022
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within…
GGeneral ICT
automotive mobile
Read More
  • 2 minute read

What’s wrong with apps?

  • byOlarewaju Akeju
  • July 14, 2022
The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a…
DDisaster Recovery & Business Continuity
Read More
  • 1 minute read

Managed detection and response in 2021

  • byOlarewaju Akeju
  • June 28, 2022
Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house…
DDisaster Recovery & Business Continuity
Data Breach Investigations Report
Read More
  • 2 minute read

The Verizon 2022 DBIR Data Breach Investigations Report

  • byOlarewaju Akeju
  • June 28, 2022
The Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this…
GGeneral ICT
IT threat
Read More
  • 3 minute read

IT threat evolution in Q1 2022. Non-mobile statistics

  • byOlarewaju Akeju
  • June 28, 2022
IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in…
send us an email to discuss your new project
Send Us A Brief
Twitter Facebook Youtube Instagram Linkedin
© 2023 Xown Solutions. All right Reserved
Contact Us