top of page
Search


Hacktivism: A Force For Intervention?
This special variety of hackers live and breathe cyber vigilantism, and exist as a mechanism for social justice.

Wembley Partners
Jan 17, 20226 min read
175 views
1 comment


News Tangles Over Facebook's Massive Outage
This part of the Facebook outage saga is rooted in claims from online posts that lack tangible proof and therefore remain unverified.

Wembley Partners
Jan 12, 20225 min read
33 views
0 comments


Windows Subsystem Under Attack After Warning Dismissed
The case serves as a perfect example of when theoretical attack scenarios and proof-of-concepts developed by researchers go unheeded.

Wembley Partners
Dec 21, 20215 min read
112 views
0 comments


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
126 views
0 comments


A Hacktivist's Encounter With a Cunning Scammer
The thrill of stealing money seems to be the downfall of many scammers who are in a hurry to close a deal and move on to the next victim.

Wembley Partners
Dec 9, 20215 min read
59 views
0 comments


New US Bill Could Require Businesses to Report Ransomware Payouts
The bill is designed to help reveal the scope of ransomware attacks, the groups behind them and the scope of their operations.

Wembley Partners
Nov 4, 20214 min read
29 views
0 comments


DNS Spoofing Attacks And How To Protect Yourself
Often, the victim of a cyberattack has no idea they've been compromised until much later. DNS spoofing is a good example of such exploits.

Wembley Partners
Sep 22, 20214 min read
209 views
0 comments


Insider Threats: When Trust Is Broken
A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.

Wembley Partners
Aug 26, 20216 min read
60 views
0 comments


Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.

Wembley Partners
Aug 12, 20215 min read
152 views
0 comments


iOS Wireless Naming Bug, Click-less Zero-Day & Why Is It Critical To Maintain Updates
Everything these days runs on software, and like most things created by people, it is imperfect. Let's dissect a recent critical iOS issue.

Wembley Partners
Jul 28, 20216 min read
49 views
0 comments


An Inside Look Into Black Hats, Motives, and Cybercrime: Ideologies Explained
Is the world as black and white as the proverbial "hats" that hackers wear? We explore the topic with the hacktivist group, GhostSec.

Wembley Partners
Jul 15, 20216 min read
220 views
1 comment


A Former Black Hat's Perspective On The Importance of Incident Response Planning
A former hacker’s perspective on when network guardians are asleep at the wheel during a worst-case scenario.

Wembley Partners
Jul 8, 20215 min read
130 views
1 comment


NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?

Wembley Partners
Jun 18, 20214 min read
6,488 views
0 comments


Whose Job is it to Respond to Cyber Incidents Anyway?
It is a common misconception to perceive cyber defense as a purely technical matter. The reality is, cybersecurity is a holistic function.

Wembley Partners
Apr 15, 20215 min read
98 views
0 comments


The Facebook Breach: Everything You Need To Know
While families spent the weekend unwrapping their Easter chocolate, cybercriminals were unwrapping a treat of an entirely different nature.

Wembley Partners
Apr 6, 20215 min read
186 views
0 comments
bottom of page