Business Process Compromise

Attackers look for vulnerable practices or operational loopholes to find a entry into business. Once they have found a vulnerability, the attacker will alter part of the process to their…

Bluetooth Security Ache

While going through the various Bluetooth attacks , its worthwhile to post in on the types of attacks prevails currently Bluebugging. Bluebugging is a type of a Bluetooth attack through…
Backdoor Diplomacy APT

Backdoor Diplomacy APT

An APT group is targeting diplomats across Africa and the Middle East dubbed BackdoorDiplomacy, operated since 2017 a cross platform attacking group has been linked to successful attacks against Ministries…