Stay Tuned!

Subscribe to our newsletter to get our newest articles instantly!


Healthcare Supply Chains Reimagined: Blockchain Innovations

Continual evolution characterises the healthcare sector, and emerging technologies like blockchain present fresh prospects for enhancing the supply chain. Nevertheless, conventional healthcare supply chains grapple with numerous inefficiencies and inaccuracies, resulting in escalated costs and diminished patient care quality. This short blog will explore how blockchain can transform the healthcare supply chain and improve patient […]

Feature Security

Get in Touch with Security Vendors: Your Guide to Contacting VirusTotal and Beyond

Background As we wrote this blog – Managing the Aftermath of a Web Phishing Attack: Strategies from Detection to Last Vendor False Positive Cleared (see the link below), we then created an extended blog dedicated to how to contact the security vendor for VirusTotal and Non-VirusTotal vendors. This list might grow, especially for the Non-VirusTotal […]


Protect Your Business: Avoid These Cybersecurity Mistakes

Introduction In today’s digital landscape, cybersecurity is crucial for business operations. As cyber-attacks and data breaches become more frequent, having a strong cybersecurity strategy is paramount. This blog will cover common cybersecurity mistakes made by businesses and provide practical tips to avoid them. The rise of technology has led to a significant increase in cyber […]


Don’t Fall for the Trickery: Understanding Social Engineering and How to Protect Yourself

What is Social Engineering Social engineering involves manipulating people into revealing confidential information or doing things that may not be in their best interest. It is a tactic often used by attackers. It is a psychological manipulation that exploits human trust and social norms to achieve a desired outcome. According to ZD-Net, organisations face an average […]

Feature Security

How to Make Apple iPhone/iPad More Secure

  • 4 November 2022

Background With the latest data breach news of the telco company lately, users are concerned about security. They do banking via phone and have a lot of questions about making their phone or tablet more secure from external malicious. Apple’s closed system is designed to work only inside set parameters that can communicate to other […]


How Secure is the Email Connection from End to End

  • 5 July 2022

Background There was a perception the email was somehow not secure end to end, and the hacker could sniff around the email package. Solution Most of the email servers, the hosted one especially, implemented the Transport Layer Security (TLS), a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely […]


How to Install the Kali Linux on Windows 11 via Hyper-V

  • 20 February 2022

Environment These are the current environment: Custom PC machine with AMD Chip and Gigabyte motherboard. Microsoft Windows 11. Kali Linux Open up a browser and go to On the top navigation, click the Get Kali option. Select the Bare Metal option below. Ensure to the iso download the 64-bit Installer option. Hardware Virtualisation Need […]