Clients
Media Mentions
Recent Articles
Recently I came across a phishing page that simulated Whatsapp Web login workflow. It was really a clear clone – the QR code changed every 20 seconds and if I were in China I would have definitely needed to look at the URL carefully. What is Whatsapp Web? WhatsApp Web…
Navigating the complex world of cybersecurity can be a daunting task, especially when it comes to understanding the different roles and their responsibilities. In this landscape, Security Analysts, Security Engineers, and Security Researchers are the front-runners, each contributing in a unique way. Let’s delve into these roles and break down…
Introduction Performing a forensic investigation on an AWS EC2 instance can become complicated if access to the instance is lost or the SSH key is unavailable. Recently, I came upon a case where I did not have the private key to the instance. The only details I had, were the…