top of page


Active Reconnaissance: The Thief's Blueprint for Burglary
In a previous blog post we covered passive reconnaissance. The next step for the cybercriminal is active reconnaissance, a further...
shaun9968
Dec 24, 20243 min read


Passive Reconnaissance: What Hackers Learn About your Business and How to Minimize your Exposure
Introduction You have probably heard of the term “reconnaissance”, and most likely that will conjure up different images for different...
shaun9968
Dec 19, 20245 min read


Beware the Trojan Horse: Unmasking Upload Vulnerabilities in Your Business
Introduction Imagine a bustling marketplace, where merchants display their goods, and guards stand at the gate, screening each visitor....
shaun9968
Nov 8, 20245 min read


An Introduction to Man-in-the-Middle Attacks
“The Eavesdropper in the Digital Alley” In the world of cybersecurity, there are few attacks as cunning and deceptive as the...
shaun9968
Oct 29, 20248 min read


Title: Understanding IDOR Vulnerabilities and Their Impact on Business Security.
Introduction You may be forgiven for not being familiar with the acronym IDOR. The term behind the acronym, Insecure Direct Object...
shaun9968
Oct 25, 20245 min read


Title: Session Hijacking: A Hidden Threat to Your Business’s Security
In this blog, we’ll discuss what session hijacking is, explore how it happens, and reveal the potential dangers it poses to businesses in...
shaun9968
Oct 8, 20244 min read


Command Injection: A Critical Security Threat for Businesses
In today’s increasingly connected world, web applications are like the doors and windows of your business. They allow data to flow in and...
shaun9968
Sep 24, 20245 min read


An introduction to Zero Trust Architectures:
Zero trust, a term which gives a fair amount away about what it means in those two words alone. Zero (No) Trust. So how does this fit in...
shaun9968
Sep 20, 20244 min read


A Comprehensive Guide to IT Usage Policies and New Starter IT Training from a Security Perspective
In today’s digital landscape, where cyber threats are increasingly sophisticated, it’s more crucial than ever for organizations to have...
shaun9968
Aug 21, 20246 min read


Staying Safe Online: A Guide for Parents to Protect Their Children
In today’s digital world, the internet is woven into every aspect of our lives. For children, it has become a vast digital playground of...
shaun9968
Aug 12, 20249 min read
Cyber Security Blogs
bottom of page
