

Password Spraying & Credential Stuffing An often recurring question I get asked is: “When...
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or...
Web Scraping of Credit Cards Last year, several different e-retailers' credit card forms, on their web pages, were hijacked. Where JavaScript was injected,...
1. Simply a Programming Error? If you get a developer to set up a back door. It can be so subtle, you might mistake it for a programming error. Occasionally,...