Aeden MurrayOct 31, 2023Conducting OSINT via DNSIntroduction In the digital world, conducting an open-source intelligence (OSINT) assessment against your organization is an important...
ShadowscapeDec 13, 2021Log4j Java vulnerability is devastating, so what can you do to protect yourself?One of the most popular logging libraries in Java, Log4j, was recently discovered to have serious cybersecurity vulnerabilities. While...
ShadowscapeNov 23, 2021Tardigrade Malware Targets Biomanufacturing IndustryThe Tardigrade malware, which has, in a much simpler form been infecting industrial control systems since the mid-2010s, now appears to...