cyber security

Modern-Day Library of Alexandria Burned: Internet Archive Attack

We were first exposed to the Internet Archive ages ago through their service the Wayback Machine, which archives websites. It’s a pretty cool service and really interesting to see old 00’s websites as well as see how web pages for certain sites evolved over time. From an offensive cyber security and OSINT perspective, the Wayback […]

Modern-Day Library of Alexandria Burned: Internet Archive Attack Read More »

.txt files

Interesting Website .txt Files

From an OSINT perspective there are various interesting .txt files that websites can utilize that perform various functions and they contain a lot of useful information. robots.txt This text file, is found in the root directory of a website (e.g. https://example.com/robots.txt) This file gives instructions to bots, crawlers, and spiders using the Robots Exclusion Protocol.

Interesting Website .txt Files Read More »

Benefits of an External Cyber Risk/Threat Assessment is the title on the picture. The top half of the picture is computer code. The bottom half of the picture are pin buttons with the logos of different social media platforms. This includes Twitter, TikTok, Facebook, Instagram, and LinkedIn.

Benefits of an External Cyber Risk/Threat Assessment

In this article, we’re going to talk about some of the benefits of an external cyber risk/threat assessment. First, you might be wondering what an external cyber risk/threat assessment is. This is our core competency where we look at what’s happening beyond the four walls of your organization. We’re looking at your publicly facing assets

Benefits of an External Cyber Risk/Threat Assessment Read More »

The importance of Information Security for your business

The Importance of Information Security for Your Business

Whether you’re a small business owner, you’re expanding, or operating at the national level, we want to talk about the importance of information security for your business. Increasing compliance As more data privacy laws go into effect for different states, or bills are being voted on, or drafted, your business may find itself needing to

The Importance of Information Security for Your Business Read More »