• Facebook
  • Twitter
  • Instagram
  • Youtube
  • LinkedIn
Recent Post
  • CLOUD SECURITY THREAT (a serious business plaque) 
  • SECURITY BREACHES OF REMOTE WORKING
  • Why You Should Avoid Public Wi-Fi (Wireless Fidelity)
  • Kerboroasting Attack
  • Why do your Email go to spam?
  • About Us
  • Solutions
  • Industries
  • Resources
  • Careers
  • blog

Browsing Category

Cybersecurity

19 posts
CCybersecurity
Read More
  • 4 minute read

SECURITY BREACHES OF REMOTE WORKING

  • byPraise Okaegbu
  • February 16, 2023
Recent top market research has revealed that about 70% of employees working remotely experience cybersecurity breaches either inconspicuously…
CCybersecurity
Read More
  • 3 minute read

Why You Should Avoid Public Wi-Fi (Wireless Fidelity)

  • byPraise Okaegbu
  • January 31, 2023
Public Wireless Fidelity (Wi-Fi) users are at risk from hackers, but fortunately, there are safeguards against them. The…
CCybersecurity
Kerboroasting
Read More
  • 3 minute read

Kerboroasting Attack

  • byBenjamin Akano
  • January 27, 2023
The scary face of Kerberoasting attack The ugly truth is that cybercrime is on the rise. It has…
CCybersecurity
Read More
  • 2 minute read

Recover your missing or lost device

  • byBenjamin Akano
  • September 23, 2022
Have your gadget ever been stolen, missing, or misplaced and you wish it could be recovered? As the…
CCybersecurity
Read More
  • 2 minute read

Protecting your Organization from Cyber Threats

  • byBenjamin Akano
  • September 23, 2022
Effective cybersecurity is crucial to businesses — and it’s becoming even more important as businesses are transforming digitally…
CCybersecurity
Read More
  • 3 minute read

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

  • byOlarewaju Akeju
  • July 21, 2022
In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back…
CCybersecurity
scams
Read More
  • 3 minute read

Text-based fraud: from 419 scams to vishing

  • byOlarewaju Akeju
  • July 18, 2022
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But…
CCybersecurity
ransomware attacks
Read More
  • 7 minute read

WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

  • byOlarewaju Akeju
  • July 18, 2022
INTRODUCTION TO RANSOMWARE   RANSOMWARE is a particular class of malwares that demands payment in exchange for a stolen functionality,…
CCybersecurity
HTML phishing
Read More
  • 3 minute read

HTML attachments in phishing e-mails

  • byOlarewaju Akeju
  • June 20, 2022
The use of embedded HTML documents in phishing e-mails is a standard technique employed by cybercriminals. It does…
CCybersecurity
Ransomware
Read More
  • 3 minute read

New ransomware trends in 2022

  • byInioluwa Akindehin
  • May 30, 2022
Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ransomware landscape in 2022. This year, ransomware…
send us an email to discuss your new project
Send Us A Brief
Twitter Facebook Youtube Instagram Linkedin
© 2023 Xown Solutions. All right Reserved
Contact Us