top of page
Welcome
to Our Blog


Analysis of DDoS Attacks and Their Implications for Hawaiian Businesses
Introduction In today’s landscape, businesses rely heavily on their online presence to connect with customers, provide services, and...
Francis Borges
Mar 25 min read
Â
Â


Hackers Disguise Lumma Stealer Malware as Reddit and WeTransfer Pages
In a sophisticated cyber-attack, hackers are exploiting the brand identities of popular platforms such as Reddit and WeTransfer to...
Francis Borges
Jan 233 min read
Â
Â


2024 Crypto Heist Champions: North Korea’s Escalating Role in the Billion-Dollar Theft Epidemic
Introduction As the world embraces digital currencies, the parallel rise in cyber threats has become an alarming concern. In 2024,...
Francis Borges
Dec 22, 20245 min read
Â
Â


Navigating IT Challenges in Paradise: How Local Businesses in Honolulu Are Overcoming Obstacles with Dynacomp IT Solutions
Honolulu, a city renowned for its idyllic beaches and vibrant culture, offers a unique backdrop for businesses. Yet, operating in such a...
Francis Borges
Dec 1, 20246 min read
Â
Â


Gootloader Malware: Resurfaced SEO Poisoning Attacks
It seems GootLoader malware is back in the spotlight this month. This malicious software has been making waves by employing SEO...
Francis Borges
Nov 13, 20243 min read
Â
Â


Wireless Security Threats: How Tools Like Aircrack-ng, Aireplay-ng, and Airodump-ng Can Be Used to Breach Networks
Hello! In the world of wireless security, understanding potential threats is key to safeguarding your network. While some tools are...
Francis Borges
Nov 7, 20243 min read
Â
Â


What is Zero Trust Architecture for Business Security?
In the evolving realm of cybersecurity, where threats are increasingly sophisticated and pervasive, businesses need a security approach...
Francis Borges
Oct 24, 20243 min read
Â
Â


Understanding Penetration Testing: A Comprehensive Guide to Strengthening Business Security
Aloha! Today will be a short post about what Penetration Testing is, the process, and some of the benefits.
Francis Borges
Oct 18, 20244 min read
Â
Â


The Risks of Video Game Mods: An Easy Way for Malware to Spread
Game modifications, or "mods", have always been a significant aspect of the gaming culture, allowing players to customize and enhance...
Francis Borges
Oct 8, 20244 min read
Â
Â


Hawaii Health Center Hit By Data Breach
On September 26, 2024, the Community Clinic of Maui, Inc., known as Malama I Ke Ola Health Center, reported a data breach to the Attorney...
Francis Borges
Sep 30, 20245 min read
Â
Â


Unmasking the Massive AMOS Info-stealer Malware Operation by the Marko Polo Hacker Group
Researchers have recently uncovered a colossal info-stealer malware operation attributed to the infamous "Marko Polo" hacker group.
Francis Borges
Sep 24, 20243 min read
Â
Â


Fake CAPTCHA Malware Lumma Stealer Targets Windows Users
A new form of malware delivery has emerged, utilizing some hilariously deceptive techniques to target Windows users. This (very) simple...
Francis Borges
Sep 17, 20243 min read
Â
Â


CovertCatch Malware: North Korean Hackers Using Linkedin for spreading Rustbucket Malware
North Korean threat actors have been detected using LinkedIn to target developers through bogus job recruiting schemes. Utilizing "coding...
Francis Borges
Sep 8, 20243 min read
Â
Â


What is the "Pegasus Pervert Email" Scam?
What is the "Pegasus Pervert Email" Scam? And why is it in Hawai'i?
Francis Borges
Sep 5, 20243 min read
Â
Â


The Latest Developments in Phishing: Trends and How to Protect Against Phishing
Today we cover Phishing and other common scams seen in the digital space.
Francis Borges
Sep 3, 20243 min read
Â
Â
bottom of page
