BLOG POSTS
Unraveling the Jargon: Understanding Endpoint Security & Beyond
Back in 2013, a game-changing technology called EDR burst onto the scene, revolutionizing our approach to safeguarding our digital domains. This “new” tech sought to supercharge digital forensics on endpoint systems, eliminating the need...
AI Kills Hash Based Detections
Whether it is ChatGPT, GPT4, Bard, or any of the other AI systems competing for public attention, these systems represent a significant leap forward in Malware as a Service (MaaS) capabilities. While it is true there are supposed to be...
A Brief History of NAS Ransomware
It is no secret that NAS devices are frequently targeted by ransomware attacks, and for good reason. Critical data is often stored on devices. Furthermore, NAS devices typically store large amounts of data. NAS devices run Linux operating...