top of page
Search


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
126 views
0 comments


Who Will Own The Metaverse?
Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?

Wembley Partners
Nov 18, 20214 min read
28 views
0 comments


How Threat Actors Bypass 2-Factor Authentication
You're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?

Wembley Partners
Aug 20, 20215 min read
271 views
0 comments


Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.

Wembley Partners
Aug 12, 20215 min read
152 views
0 comments


iOS Wireless Naming Bug, Click-less Zero-Day & Why Is It Critical To Maintain Updates
Everything these days runs on software, and like most things created by people, it is imperfect. Let's dissect a recent critical iOS issue.

Wembley Partners
Jul 28, 20216 min read
49 views
0 comments


Five Basic Plays To Help Prevent Cybercriminals From Gaining Access
Cyber threats will not go away any time soon, so let's get serious about our online security by using (at least) these 5 basic methods.

Wembley Partners
Jul 22, 20216 min read
53 views
0 comments


What is a CIS AWS Foundations Benchmark and How is it Useful?
Amazon's CIS AWS Foundations Benchmark is a set of compliance regulations for protecting resources hosted on Amazon Web Services.

Wembley Partners
Jun 2, 20214 min read
45 views
0 comments
bottom of page