top of page
Search


Everything About the Catastrophic Zero-Day Log4j Exploit
When exploited, it allows threat actors to take control over log messages and log message parameters.

Wembley Partners
Dec 17, 20214 min read
126 views
0 comments


Windows Attack Vectors Under The Microscope
The scope of this article is to examine some of the tools and vulnerabilities threat actors are using to exploit Windows OS.

Wembley Partners
Nov 15, 20216 min read
288 views
0 comments


Bug Bounty Program: When Businesses Collaborate With Hackers
To a hacker, there is no greater opportunity than to hack what is thought to be unhackable.

Wembley Partners
Nov 11, 20214 min read
50 views
0 comments


DNS Spoofing Attacks And How To Protect Yourself
Often, the victim of a cyberattack has no idea they've been compromised until much later. DNS spoofing is a good example of such exploits.

Wembley Partners
Sep 22, 20214 min read
209 views
0 comments


Exploits Into Wireless Security Explained
Anticipating all the possible network entry points that can be exploited by a cybercriminal is a tall ask. Here, we explore WPS security.

Wembley Partners
Sep 10, 20214 min read
110 views
1 comment


How Threat Actors Bypass 2-Factor Authentication
You're using 2-Factor Authentication. An excellent choice! But is it really as bulletproof as some say?

Wembley Partners
Aug 20, 20215 min read
271 views
0 comments


Automated Cyber Weapons: The Cobalt Strike Bug, And The Dangers of Automation
What if sophisticated Penetration Testing and cyber defence tools can be turned against us? A Cobalt Strike bug shows it's possible.

Wembley Partners
Aug 12, 20215 min read
152 views
0 comments


Penetration Testing Vs Red-Teaming – What’s The Difference?
Penetration Tests and Red Teaming exercises: a common misconception is that these are interchangeable. We're here to clarify.

Wembley Partners
Jun 25, 20213 min read
63 views
0 comments


NIST, ISO, COBIT, ITIL – Which Cyber Framework Rules Them All?
Which is the best among the four major cybersecurity and risk management frameworks that foster efficient cyber protection?

Wembley Partners
Jun 18, 20214 min read
6,488 views
0 comments


What is a Threat Intelligence-Led Penetration Test?
How does a Threat Intelligence-led penetration test differ from a conventional one? We explore the differences and the similarities here.

Wembley Partners
Jun 10, 20214 min read
726 views
0 comments


What is a CIS AWS Foundations Benchmark and How is it Useful?
Amazon's CIS AWS Foundations Benchmark is a set of compliance regulations for protecting resources hosted on Amazon Web Services.

Wembley Partners
Jun 2, 20214 min read
45 views
0 comments


Why Does Cyber Threat Intelligence Matter?
In any historical period, the military valued one thing above all others before and during warfare: intelligence. But what about business?

Wembley Partners
May 7, 20214 min read
49 views
0 comments
bottom of page