Xown Solutions
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • LinkedIn
Xown Solutions
Xown Solutions
  • About Us
  • Solutions
  • Industries
  • Resources
  • Careers
  • blog

Olarewaju Akeju

32 posts
DDisaster Recovery & Business Continuity
Read More

    APT ToddyCat

    • byOlarewaju Akeju
    • July 14, 2022
    Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia ToddyCat is a relatively new APT…
    GGeneral ICT
    corporate infrastructure
    Read More

      How much does access to corporate infrastructure cost?

      • byOlarewaju Akeju
      • July 14, 2022
      In contrast, less experienced cybercriminals are not always able to see an attack through to the end (malware…
      DDisaster Recovery & Business Continuity
      Read More

        The SessionManager IIS backdoor

        • byOlarewaju Akeju
        • July 14, 2022
        Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within…
        GGeneral ICT
        automotive mobile
        Read More

          What’s wrong with apps?

          • byOlarewaju Akeju
          • July 14, 2022
          The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a…
          DDisaster Recovery & Business Continuity
          Read More

            Managed detection and response in 2021

            • byOlarewaju Akeju
            • June 28, 2022
            Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house…
            DDisaster Recovery & Business Continuity
            Data Breach Investigations Report
            Read More

              The Verizon 2022 DBIR Data Breach Investigations Report

              • byOlarewaju Akeju
              • June 28, 2022
              The Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this…
              GGeneral ICT
              IT threat
              Read More

                IT threat evolution in Q1 2022. Non-mobile statistics

                • byOlarewaju Akeju
                • June 28, 2022
                IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in…
                DDisaster Recovery & Business Continuity
                Ransomware
                Read More

                  The hateful eight: Kaspersky’s guide to modern ransomware groups’ TTPs

                  • byOlarewaju Akeju
                  • June 28, 2022
                  These days ransomware analysis gets a lot of coverage in commercial and public reports, with vendors issuing dozens…
                  CCybersecurity
                  HTML phishing
                  Read More

                    HTML attachments in phishing e-mails

                    • byOlarewaju Akeju
                    • June 20, 2022
                    The use of embedded HTML documents in phishing e-mails is a standard technique employed by cybercriminals. It does…
                    CCybersecurity
                    Read More

                      Endpoint Security for Your Business

                      • byOlarewaju Akeju
                      • May 13, 2022
                      What is Endpoint security? Endpoint security, also known as endpoint protection, refers to the defense of internet-connected devices such…
                      Trending
                      • Productivity Check: How to Assess When You Work Best September 15, 2025
                      • Sach AI Business Growth: Solve Your Biggest Challenges September 9, 2025
                      • The Future of Business is Digital: Are You Moving Fast Enough? August 27, 2025
                      • Consistent Leads with Sach AI: Smarter Growth for Your Business August 26, 2025
                      • Conversations That Close Deals with SACH AI August 25, 2025
                      • Digital Transformation for Business Growth August 22, 2025
                      • Cybersecurity Is the Shield That Keeps Your Business Alive August 21, 2025
                      send us an email to discuss your new project
                      Send Us A Brief
                      Twitter Facebook Youtube Instagram Linkedin
                      © 2023 Xown Solutions. All right Reserved
                      Contact Us
                      ×
                        • What is Endpoint security?
                        • With Employees working flexibly and remotely, secure your business!
                      • Don’t be a victim. Secure your business today!
                        • Contact us today for endpoint security solutions for your business via mail at sales@xownsolutions.com or visit our website at xownsolutions.com. You can also reach out to us via this line: 08172043789.
                      → Table Of Content
                      Welcome to Xown Solutions, where technology meets innovation! Our website uses cookies to improve your browsing experience. We use essential session cookies for site functionality and preference cookies to remember your settings. Analytics cookies help us understand how you use our site while advertising cookies tailor ads to your interests. Security cookies keep your data safe, and we may also use third-party cookies for integrated content. You can manage your cookie preferences via your browser settings or our cookie consent banner. Your privacy and preferences are important to us at Xown Solutions. View more
                      Cookies settings
                      Accept
                      Decline
                      Privacy & Cookie policy
                      Privacy & Cookies policy
                      Cookies list
                      Cookie name Active
                      Save settings
                      Newsletter Signup

                      Subscribe to our weekly newsletter below and never miss the latest product or an exclusive offer.

                      Name
                      Enter your email address