top of page
Search


Hacktivism: A Force For Intervention?
This special variety of hackers live and breathe cyber vigilantism, and exist as a mechanism for social justice.

Wembley Partners
Jan 17, 20226 min read
Â
Â
Â


News Tangles Over Facebook's Massive Outage
This part of the Facebook outage saga is rooted in claims from online posts that lack tangible proof and therefore remain unverified.

Wembley Partners
Jan 12, 20225 min read
Â
Â
Â


A Closer Look At Hacktivists Thwarting Terrorist Attacks
Meet GhostSec. The group isn’t your typical hacktivists. This is the group of cyber vigilantes who foiled terrorist attacks planned by ISIS.

Wembley Partners
Jan 5, 20225 min read
Â
Â
Â


When Public Disclosure Creates a Nightmare Scenario: The Case Of Secure Disclosure Policy
Is it possible that industry researchers inadvertently cause security risks through the public disclosures of the vulnerabilities they find?

Wembley Partners
Dec 29, 20215 min read
Â
Â
Â


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
Â
Â
Â


A Hacktivist's Encounter With a Cunning Scammer
The thrill of stealing money seems to be the downfall of many scammers who are in a hurry to close a deal and move on to the next victim.

Wembley Partners
Dec 9, 20215 min read
Â
Â
Â


US Dept. Of Commerce Clamps Down On Sales Of Commercial Hacking Tools
The rule to change how US companies engage in sales of hacking tools designed to penetrate digital devices to conduct surveillance.

Wembley Partners
Nov 30, 20213 min read
Â
Â
Â


It’s Time to Patch Up: US Federal Agencies to Fix Critical Cybersecurity Flaws
Whatever the reason is, the new directive by the Biden Administration carries the impression that cybersecurity has finally taken priority.

Wembley Partners
Nov 26, 20214 min read
Â
Â
Â


The Ethical Hacker’s Mind For National Security
For years, hackers have tried to offer a helping hand to various government agencies concerning vulnerabilities they try to address.

Wembley Partners
Nov 23, 20215 min read
Â
Â
Â


Who Will Own The Metaverse?
Zuckerberg made it clear that Meta does not want to be only recognized as a social media platform. What is it, then?

Wembley Partners
Nov 18, 20214 min read
Â
Â
Â


Windows Attack Vectors Under The Microscope
The scope of this article is to examine some of the tools and vulnerabilities threat actors are using to exploit Windows OS.

Wembley Partners
Nov 15, 20216 min read
Â
Â
Â


New US Bill Could Require Businesses to Report Ransomware Payouts
The bill is designed to help reveal the scope of ransomware attacks, the groups behind them and the scope of their operations.

Wembley Partners
Nov 4, 20214 min read
Â
Â
Â


Insider Threats: When Trust Is Broken
A great colleague, a malicious insider, or both? A deeper look into insider threats and the associated attack vectors.

Wembley Partners
Aug 26, 20216 min read
Â
Â
Â


How Threat Actors Bypass 2-Factor Authentication
You're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?

Wembley Partners
Aug 20, 20215 min read
Â
Â
Â


The Power Of Investigative Intelligence Tools Helps Law Enforcement Solve Cases Faster
The futuristic tech that the movie police uses to track criminals...how much of this is fact, and how much is fiction?

Wembley Partners
Aug 5, 20215 min read
Â
Â
Â


Five Basic Plays To Help Prevent Cybercriminals From Gaining Access
Cyber threats will not go away any time soon, so let's get serious about our online security by using (at least) these 5 basic methods.

Wembley Partners
Jul 22, 20216 min read
Â
Â
Â


An Inside Look Into Black Hats, Motives, and Cybercrime: Ideologies Explained
Is the world as black and white as the proverbial "hats" that hackers wear? We explore the topic with the hacktivist group, GhostSec.

Wembley Partners
Jul 15, 20216 min read
Â
Â
Â


Penetration Testing Vs Red-Teaming – What’s The Difference?
Penetration Tests and Red Teaming exercises: a common misconception is that these are interchangeable. We're here to clarify.

Wembley Partners
Jun 25, 20213 min read
Â
Â
Â


NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?

Wembley Partners
Jun 18, 20214 min read
Â
Â
Â


Cylera and Wembley Partners Team Up To Tackle IoT Cyber Attacks Threatening Canadian Businesses
Wembley Partners Ltd., and Cylera, Inc. have entered into a strategic partnership to help Canadian businesses combat IoT cyber threats.

Wembley Partners
Jun 3, 20213 min read
Â
Â
Â
bottom of page