Stay updated with the latest cybersecurity news.


Dealing with JavaScript obfuscations – Part 2

Mon Jun 01 2020

In part one, we learned about Javascript as a malware and we started to understand…


Dealing with JavaScript obfuscations – Part 1

Wed May 27 2020

Using JavaScript in cyber attacks is not exactly new, but more and more attackers are…


Undetect me if you can

Thu May 21 2020

A new variant of the raccoon malware to steal user data from browsers.  The one…


“Tell me about yourself”: Conducting job interviews from home

Thu May 21 2020

Let’s be honest. The novelty of working from home has worn off. People, communities, and…


Multistage malware breakdown – Part 2

Sun May 17 2020

In the last part, we started analyzing an HTA file, which revealed a Powershell script…


Multistage malware breakdown – Part 3

Sun May 17 2020

The Ads.jpg analysis So after extracting the information from the VBScript, we saw a download…


Multistage malware breakdown – Part 1

Wed May 13 2020

Nowadays, malware is more sophisticated due to the use of obfuscation techniques. The goal of…


Get some ‘quarantime’ with your kids

Mon May 11 2020

Unprecedented, unusual, unwanted; shelter-in-place life is all that and more. Yet, according to medical experts,…


COVID-19: Keeping internal work teams up to speed

Mon May 11 2020

Being a leader of remote work teams is many things, but easy isn’t one of…


Can the Internet handle all the traffic while everyone works from home?

Mon Apr 13 2020

Since the COVID-19 pandemic thrust the world into shelter-in-place mode, more people are relying on…