CCybersecurity Read More 4 minute read SECURITY BREACHES OF REMOTE WORKINGbyPraise OkaegbuFebruary 16, 2023 Recent top market research has revealed that about 70% of employees working remotely experience cybersecurity breaches either inconspicuously…
CCybersecurity Read More 3 minute read Why You Should Avoid Public Wi-Fi (Wireless Fidelity)byPraise OkaegbuJanuary 31, 2023 Public Wireless Fidelity (Wi-Fi) users are at risk from hackers, but fortunately, there are safeguards against them. The…
CCybersecurity Read More 3 minute read Kerboroasting AttackbyBenjamin AkanoJanuary 27, 2023 The scary face of Kerberoasting attack The ugly truth is that cybercrime is on the rise. It has…
CCybersecurity Read More 2 minute read Recover your missing or lost devicebyBenjamin AkanoSeptember 23, 2022 Have your gadget ever been stolen, missing, or misplaced and you wish it could be recovered? As the…
CCybersecurity Read More 2 minute read Protecting your Organization from Cyber ThreatsbyBenjamin AkanoSeptember 23, 2022 Effective cybersecurity is crucial to businesses — and it’s becoming even more important as businesses are transforming digitally…
CCybersecurity Read More 3 minute read Luna and Black Basta — new ransomware for Windows, Linux and ESXibyOlarewaju AkejuJuly 21, 2022 In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back…
CCybersecurity Read More 3 minute read Text-based fraud: from 419 scams to vishingbyOlarewaju AkejuJuly 18, 2022 E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But…
CCybersecurity Read More 7 minute read WHAT YOU NEED TO KNOW ABOUT RANSOMWAREbyOlarewaju AkejuJuly 18, 2022 INTRODUCTION TO RANSOMWARE RANSOMWARE is a particular class of malwares that demands payment in exchange for a stolen functionality,…
CCybersecurity Read More 3 minute read HTML attachments in phishing e-mailsbyOlarewaju AkejuJune 20, 2022 The use of embedded HTML documents in phishing e-mails is a standard technique employed by cybercriminals. It does…
CCybersecurity Read More 3 minute read New ransomware trends in 2022byInioluwa AkindehinMay 30, 2022 Ahead of the Anti-Ransomware Day, we summarized the tendencies that characterize ransomware landscape in 2022. This year, ransomware…