top of page
Welcome
to Our Blog
Francis Borges
Dec 22, 20245 min read
2024 Crypto Heist Champions: North Korea’s Escalating Role in the Billion-Dollar Theft Epidemic
Introduction As the world embraces digital currencies, the parallel rise in cyber threats has become an alarming concern. In 2024,...
400 views
Francis Borges
Dec 1, 20246 min read
Navigating IT Challenges in Paradise: How Local Businesses in Honolulu Are Overcoming Obstacles with Dynacomp IT Solutions
Honolulu, a city renowned for its idyllic beaches and vibrant culture, offers a unique backdrop for businesses. Yet, operating in such a...
413 views
Francis Borges
Nov 13, 20243 min read
Gootloader Malware: Resurfaced SEO Poisoning Attacks
It seems GootLoader malware is back in the spotlight this month. This malicious software has been making waves by employing SEO...
466 views
Francis Borges
Nov 7, 20243 min read
Wireless Security Threats: How Tools Like Aircrack-ng, Aireplay-ng, and Airodump-ng Can Be Used to Breach Networks
Hello! In the world of wireless security, understanding potential threats is key to safeguarding your network. While some tools are...
330 views
Francis Borges
Oct 24, 20243 min read
What is Zero Trust Architecture for Business Security?
In the evolving realm of cybersecurity, where threats are increasingly sophisticated and pervasive, businesses need a security approach...
354 views
Francis Borges
Oct 18, 20244 min read
Understanding Penetration Testing: A Comprehensive Guide to Strengthening Business Security
Aloha! Today will be a short post about what Penetration Testing is, the process, and some of the benefits.
488 views
Francis Borges
Oct 8, 20244 min read
The Risks of Video Game Mods: An Easy Way for Malware to Spread
Game modifications, or "mods", have always been a significant aspect of the gaming culture, allowing players to customize and enhance...
341 views
Francis Borges
Sep 30, 20245 min read
Hawaii Health Center Hit By Data Breach
On September 26, 2024, the Community Clinic of Maui, Inc., known as Malama I Ke Ola Health Center, reported a data breach to the Attorney...
298 views
Francis Borges
Sep 24, 20243 min read
Unmasking the Massive AMOS Info-stealer Malware Operation by the Marko Polo Hacker Group
Researchers have recently uncovered a colossal info-stealer malware operation attributed to the infamous "Marko Polo" hacker group.
419 views
Francis Borges
Sep 17, 20243 min read
Fake CAPTCHA Malware Lumma Stealer Targets Windows Users
A new form of malware delivery has emerged, utilizing some hilariously deceptive techniques to target Windows users. This (very) simple...
379 views
Francis Borges
Sep 8, 20243 min read
CovertCatch Malware: North Korean Hackers Using Linkedin for spreading Rustbucket Malware
North Korean threat actors have been detected using LinkedIn to target developers through bogus job recruiting schemes. Utilizing "coding...
474 views
Francis Borges
Sep 5, 20243 min read
What is the "Pegasus Pervert Email" Scam?
What is the "Pegasus Pervert Email" Scam? And why is it in Hawai'i?
465 views
Francis Borges
Sep 3, 20243 min read
The Latest Developments in Phishing: Trends and How to Protect Against Phishing
Today we cover Phishing and other common scams seen in the digital space.
178 views
bottom of page