Intelligence Gathering – from Reconnaissance to Exploitation

Back in the days as a security consultant, I was in charge of conducting various tasks such as security audits, security controls integration and more. The ones I enjoyed the most were penetration tests which demonstrate if and how can an attacker breach a target customer. Long story short, I was getting paid to break things so what is not to like?

In: #attack

Malware - from A to Zero-day

From the theoretical work of John Von Neumann up to Zeus, Stuxnet and Cryptolocker, the malware world had seen a lot of changes and different means of accomplishing malicious goals.

This is Where We start, This is Where It Ends

For years and years, we used to chase them.

In: #wolves

Leave a Reply

    Strong Cyber Hygiene is only One Click Away

    Want to take TOPIA for a free ride? Schedule A Meeting with our 🐺team!

    Let us know what would like to see 😀