Wembley PartnersDec 17, 20214 min readEverything About the Catastrophic Zero-Day Log4j ExploitWhen exploited, it allows threat actors to take control over log messages and log message parameters.
Wembley PartnersNov 18, 20214 min readWho Will Own The Metaverse?Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?
Wembley PartnersAug 20, 20215 min readHow Threat Actors Bypass 2-Factor AuthenticationYou're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?
Wembley PartnersAug 12, 20215 min readAutomated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of AutomationWhat if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.
Wembley PartnersJul 28, 20216 min readiOS Wireless Naming Bug, Click-less Zero-Day & Why Is It Critical To Maintain Updates Everything these days runs on software, and like most things created by people, it is imperfect. Let's dissect a recent critical iOS issue.
Wembley PartnersJul 22, 20216 min readFive Basic Plays To Help Prevent Cybercriminals From Gaining AccessCyber threats will not go away any time soon, so let's get serious about our online security by using (at least) these 5 basic methods.
Wembley PartnersJun 2, 20214 min readWhat is a CIS AWS Foundations Benchmark and How is it Useful?Amazon's CIS AWS Foundations Benchmark is a set of compliance regulations for protecting resources hosted on Amazon Web Services.