Xown Solutions
  • Facebook
  • Twitter
  • Instagram
  • Youtube
  • LinkedIn
Xown Solutions
Xown Solutions
  • About Us
  • Solutions
  • Industries
  • Resources
  • Careers
  • blog
CCybersecurity
Read More

    Luna and Black Basta — new ransomware for Windows, Linux and ESXi

    • byOlarewaju Akeju
    • July 21, 2022
    In our crimeware reporting service, we analyze the latest crime-related trends we come across. If we look back…
    Read More
    CCybersecurity
    scams
    Read More

      Text-based fraud: from 419 scams to vishing

      • byOlarewaju Akeju
      • July 18, 2022
      E-mail scammers typically combine social engineering with technical skills to bypass spam filters and persuade the recipient to reply. But…
      Read More
      CCybersecurity
      ransomware attacks
      Read More

        WHAT YOU NEED TO KNOW ABOUT RANSOMWARE

        • byOlarewaju Akeju
        • July 18, 2022
        INTRODUCTION TO RANSOMWARE   RANSOMWARE is a particular class of malwares that demands payment in exchange for a stolen functionality,…
        Read More
        DDisaster Recovery & Business Continuity
        Read More

          APT ToddyCat

          • byOlarewaju Akeju
          • July 14, 2022
          Unveiling an unknown APT actor attacking high-profile entities in Europe and Asia ToddyCat is a relatively new APT…
          Read More
          GGeneral ICT
          corporate infrastructure
          Read More

            How much does access to corporate infrastructure cost?

            • byOlarewaju Akeju
            • July 14, 2022
            In contrast, less experienced cybercriminals are not always able to see an attack through to the end (malware…
            Read More
            DDisaster Recovery & Business Continuity
            Read More

              The SessionManager IIS backdoor

              • byOlarewaju Akeju
              • July 14, 2022
              Following on from our earlier Owowa discovery, we continued to hunt for more backdoors potentially set up as malicious modules within…
              Read More
              GGeneral ICT
              automotive mobile
              Read More

                What’s wrong with apps?

                • byOlarewaju Akeju
                • July 14, 2022
                The recent story about the 19-year-old hacker who took control of several dozen Tesla cars has become something of a…
                Read More
                DDisaster Recovery & Business Continuity
                Read More

                  Managed detection and response in 2021

                  • byOlarewaju Akeju
                  • June 28, 2022
                  Kaspersky Managed Detection and Response (MDR) helps organizations to complement existing detection capabilities or to expand limited in-house…
                  Read More
                  DDisaster Recovery & Business Continuity
                  Data Breach Investigations Report
                  Read More

                    The Verizon 2022 DBIR Data Breach Investigations Report

                    • byOlarewaju Akeju
                    • June 28, 2022
                    The Verizon 2022 Data Breach Investigations Report is out. We are proud to collaborate as a supporting contributor to this…
                    Read More
                    GGeneral ICT
                    IT threat
                    Read More

                      IT threat evolution in Q1 2022. Non-mobile statistics

                      • byOlarewaju Akeju
                      • June 28, 2022
                      IT threat evolution in Q1 2022 IT threat evolution in Q1 2022. Non-mobile statistics IT threat evolution in…
                      Read More

                      Posts pagination

                      Previous 1 … 16 17 18 … 20 Next
                      send us an email to discuss your new project
                      Send Us A Brief
                      Twitter Facebook Youtube Instagram Linkedin
                      © 2023 Xown Solutions. All right Reserved
                      Contact Us
                      ×
                      • Quarterly figures
                      • Financial threats
                        • Financial threat statistics
                          • Geography of financial malware attacks
                      • Ransomware programs
                        • Quarterly trends and highlights
                          • Law enforcement successes
                          • Hermetic Wiper, Hermetic Ransom and RU  ransom, etc.
                          • Conti source-code leak
                          • Attacks on NAS devices
                          • Maze Decryptor
                      → Table Of Content
                      Welcome to Xown Solutions, where technology meets innovation! Our website uses cookies to improve your browsing experience. We use essential session cookies for site functionality and preference cookies to remember your settings. Analytics cookies help us understand how you use our site while advertising cookies tailor ads to your interests. Security cookies keep your data safe, and we may also use third-party cookies for integrated content. You can manage your cookie preferences via your browser settings or our cookie consent banner. Your privacy and preferences are important to us at Xown Solutions. View more
                      Cookies settings
                      Accept
                      Decline
                      Privacy & Cookie policy
                      Privacy & Cookies policy
                      Cookies list
                      Cookie name Active
                      Save settings
                      Newsletter Signup

                      Subscribe to our weekly newsletter below and never miss the latest product or an exclusive offer.

                      Name
                      Enter your email address