• Facebook
  • Twitter
  • Instagram
  • Youtube
  • LinkedIn
Recent Post
  • CLOUD SECURITY THREAT (a serious business plaque) 
  • SECURITY BREACHES OF REMOTE WORKING
  • Why You Should Avoid Public Wi-Fi (Wireless Fidelity)
  • Kerboroasting Attack
  • Why do your Email go to spam?
  • About Us
  • Solutions
  • Industries
  • Resources
  • Careers
  • blog
CCybersecurity
Read More
  • 3 minute read

Luna and Black Basta — new ransomware for Windows, Linux and ESXi

  • byOlarewaju Akeju
  • July 21, 2022
In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back…
Read More
CCybersecurity
scams
Read More
  • 3 minute read

Text-based fraud: from 419 scams to vishing

  • byOlarewaju Akeju
  • July 18, 2022
E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But…
Read More
CCybersecurity
ransomware attacks
Read More
  • 7 minute read

WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

  • byOlarewaju Akeju
  • July 18, 2022
INTRODUCTION TO RANSOMWARE   RANSOMWARE is a particular class of malwares that demands payment in exchange for a stolen functionality,…
Read More
DDisaster Recovery & Business Continuity
Read More
  • 4 minute read

APT ToddyCat

  • byOlarewaju Akeju
  • July 14, 2022
Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia ToddyCat is a relatively new APT…
Read More
GGeneral ICT
corporate infrastructure
Read More
  • 2 minute read

How much does access to corporate infrastructure cost?

  • byOlarewaju Akeju
  • July 14, 2022
In contrast, less experienced cybercriminals are not always able to see an attack through to the end (malware…
Read More
DDisaster Recovery & Business Continuity
Read More
  • 4 minute read

The SessionManager IIS backdoor

  • byOlarewaju Akeju
  • July 14, 2022
Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within…
Read More
GGeneral ICT
automotive mobile
Read More
  • 2 minute read

What’s wrong with apps?

  • byOlarewaju Akeju
  • July 14, 2022
The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a…
Read More
DDisaster Recovery & Business Continuity
Read More
  • 1 minute read

Managed detection and response in 2021

  • byOlarewaju Akeju
  • June 28, 2022
Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house…
Read More
DDisaster Recovery & Business Continuity
Data Breach Investigations Report
Read More
  • 2 minute read

The Verizon 2022 DBIR Data Breach Investigations Report

  • byOlarewaju Akeju
  • June 28, 2022
The Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this…
Read More
GGeneral ICT
IT threat
Read More
  • 3 minute read

IT threat evolution in Q1 2022. Non-mobile statistics

  • byOlarewaju Akeju
  • June 28, 2022
IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in…
Read More

Posts navigation

Previous 1 2 3 … 5 Next
send us an email to discuss your new project
Send Us A Brief
Twitter Facebook Youtube Instagram Linkedin
© 2023 Xown Solutions. All right Reserved
Contact Us