Recent blog posts

Essential Skills for Thriving in Cybersecurity Careers
Duncan Whitley 24/04/2025

Essential Skills for Thriving in Cybersecurity Careers

As the digital world becomes increasingly complex, the demand for skilled cybersecurity professionals is higher than ever. Success in this field requires a diverse skill set, from technical expertise in threat analysis and network security to crucial soft skills like communication and problem-solving. In this post, we’ll explore the key...

All posts

Unveiling Intelligence through Honeypots' Cyber Deception
Luis Suastegui 10/05/2024

Unveiling Intelligence through Honeypots' Cyber Deception

Honeypots are intriguing tools in cybersecurity, designed to attract cyber attackers and analyze their methods. We explore the two main types, as well as the pros and cons of using them as part of your security strategy.

Cloud Surfing: Riding the Waves of Google Drive Forensics
Renmarc Andrada 18/04/2024

Cloud Surfing: Riding the Waves of Google Drive Forensics

Given the complexity of obtaining and evaluating data from cloud services, cloud storage forensics is now recognized as a key component of digital investigations in today's digitally-dependent environment. Among them, Google Drive is an excellent choice for forensic investigation because of its extensive usage and the variety of data it...

CVE-2024-2879 – Critical Vulnerability in WordPress Plugin LayerSlider
Daly Whyte 03/04/2024

CVE-2024-2879 – Critical Vulnerability in WordPress Plugin LayerSlider

Earlier today the critical vulnerability CVE-2024-2879 was announced for the widely used WordPress plugin LayerSlider, affecting versions 7.9.11 - 7.10.0. This vulnerability is an unauthenticated SQL injection with a CVSSv3 score of 9.8 with the likelihood of high impact to data confidentiality and integrity. This post will advise how to...