Article (4)
- Jake Dancey
- April 28, 2023
Executive Summary In April 2023, a surge in the use of an outdated WordPress plugin called Eval PHP was reported by...
- Patryk Machowiak
- April 27, 2023
Executive Summary On the 31st of March at 2:00pm, The Times reporter, Katie Prescott, published an article speculating...
- Sohaib Saif
- March 30, 2023
Executive Summary During the Covid-19 pandemic, TikTok quickly became one of the most popular social media platforms...
- Alex Babbage
- March 3, 2023
Executive Summary An unidentified threat actor was identified by Menlo Labs using Discord to spread an evasive threat...
- Thomas Hope
- January 30, 2023
Executive Summary One of the most important tasks for an attacker using malware to successfully compromise a target, is...
- Cyber Security Associates
- January 17, 2023
Executive Summary Although the ongoing war between Russia and Ukraine is well known since the invasion in February...
- Cyber Security Associates
- December 1, 2022
The cybersecurity landscape is more challenging and complex than ever before. The development of intelligent new...
- Cyber Security Associates
- December 1, 2022
Whether it’s governments, big corporations, or individuals, any organization with an internet connection is a possible...
- Cyber Security Associates
- November 8, 2022
Despite ransomware incidents continuing to dominate the cyber-related headlines, there seems to be a misconception...
- Cyber Security Associates
- July 25, 2022
Fraudulent Google Play Store Applications are Infecting Unsuspecting Users with Malware Although many users consider it...
- Cyber Security Associates
- July 4, 2022
The Ongoing Devaluing of Cryptocurrencies and Potential Impact on Cybercrime “All the [businesses] shared a common...
- Cyber Security Associates
- June 17, 2022
Google Chrome users are at risk to a new Emotet malware variant that steals Credit Card details If Google Chrome is...
