top of page
Search


Hacktivism: A Force For Intervention?
This special variety of hackers live and breathe cyber vigilantism, and exist as a mechanism for social justice.

Wembley Partners
Jan 17, 20226 min read
175 views
1 comment


A Closer Look At Hacktivists Thwarting Terrorist Attacks
Meet GhostSec. The group isn’t your typical hacktivists. This is the group of cyber vigilantes who foiled terrorist attacks planned by ISIS.

Wembley Partners
Jan 5, 20225 min read
584 views
1 comment


When Public Disclosure Creates a Nightmare Scenario: The Case Of Secure Disclosure Policy
Is it possible that industry researchers inadvertently cause security risks through the public disclosures of the vulnerabilities they find?

Wembley Partners
Dec 29, 20215 min read
53 views
0 comments


Windows Subsystem Under Attack After Warning Dismissed
The case serves as a perfect example of when theoretical attack scenarios and proof-of-concepts developed by researchers go unheeded.

Wembley Partners
Dec 21, 20215 min read
112 views
0 comments


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
126 views
0 comments


It’s Time to Patch Up: US Federal Agencies to Fix Critical Cybersecurity Flaws
Whatever the reason is, the new directive by the Biden Administration carries the impression that cybersecurity has finally taken priority.

Wembley Partners
Nov 26, 20214 min read
29 views
0 comments


The Ethical Hacker’s Mind For National Security
For years, hackers have tried to offer a helping hand to various government agencies concerning vulnerabilities they try to address.

Wembley Partners
Nov 23, 20215 min read
73 views
0 comments


Who Will Own The Metaverse?
Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?

Wembley Partners
Nov 18, 20214 min read
28 views
0 comments


Windows Attack Vectors Under The Microscope
The scope of this article is to examine some of the tools and vulnerabilities threat actors are using to exploit Windows OS.

Wembley Partners
Nov 15, 20216 min read
288 views
0 comments


Bug Bounty Program: When Businesses Collaborate With Hackers
To a hacker, there is no greater opportunity than to hack what is thought to be unhackable.

Wembley Partners
Nov 11, 20214 min read
50 views
0 comments


Defenseless Vulnerabilities: The Ultimate Incident Response Challenge
One of the problems with zero-day exploits is the fact they are often capable of slipping past firewalls.

Wembley Partners
Nov 9, 20215 min read
39 views
0 comments


Exploits Into Wireless Security Explained
Anticipating all the possible network entry points that can be exploited by a cybercriminal is a tall ask. Here, we explore WPS security.

Wembley Partners
Sep 10, 20214 min read
110 views
1 comment


Insider Threats: When Trust Is Broken
A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.

Wembley Partners
Aug 26, 20216 min read
60 views
0 comments


The Power Of Investigative Intelligence Tools Helps Law Enforcement Solve Cases Faster
The futuristic tech that the movie police uses to track criminals...how much of this is fact, and how much is fiction?

Wembley Partners
Aug 5, 20215 min read
88 views
0 comments


What is a Threat Intelligence-Led Penetration Test?
How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.

Wembley Partners
Jun 10, 20214 min read
726 views
0 comments


What are the Use Cases for Cyber Threat Intelligence?
We've discussed Cyber Threat Intelligence in depth this May. Now, let's talk about specific areas where CTI makes a meaningful difference.

Wembley Partners
May 28, 20215 min read
84 views
0 comments


The 3 Flavors of Cyber Threat Intelligence
We’ve discussed what Cyber Threat Intelligence is, and the various processes involved in its lifecycle. But not all CTI is made equal.

Wembley Partners
May 19, 20214 min read
45 views
0 comments


Cyber Threat Intelligence is Just Information Collection, Right?
There is a fine line between information and a useful piece of intelligence data. Let's see how they differ, and why that matters.

Wembley Partners
May 14, 20214 min read
81 views
0 comments


Why Does Cyber Threat Intelligence Matter?
In any historical period, the military valued one thing above all others before and during warfare: intelligence. But what about business?

Wembley Partners
May 7, 20214 min read
49 views
0 comments
bottom of page