How to set up a VPN
Guest written by: Laurtis Vestergaard In these next series of blogs, we will walk you through the various methods on how you can set-up a commercial VPN or create your own for secure online browsing. Previously we have looked at…
An updated history of Anonymous hacking group
Maybe you remember that approximately a year ago we published a report about the history and activities of Anonymous hacking group but what exactly has this group been doing since that time. Of course this group has been continuing their…
FSB, Russian industry leaders and government officials travel to Iran – Safiran data
After publishing our initial article about the group Hooshyarane Vatan’s hack of Safiran, we have had a bit of time to look at the data some more. We wanted to know who the Russian visitors to Iran were so started…
Hooshyarane Vatan hack Safiran
The cyber group known as Hooshyarane Vatan has once again exposed an Iranian company working with the IRGC. Read about their previous attack here and here. This time it is Safiran airport services who have been facilitating weapons and UAV…
Anonymous continues attacks as part of Op Iran
Dear reader since we published our report on the history of Anonymous the collective has continued attacks as part of OpIran. They have been able to hack many sites. They also recently have hacked IranCell and obtained the data of…
Hacked by Anonymous: Part Two of 4chan to Iran
Dear readers in our last article we describe how famous hacking group Anonymous was first formed from the website 4chan and went on to become famous for Hacktivist attacks across the world. In this next article we talk about Anonymous…
An Anonymous History: From 4chan to Iran
Dear readers in August the hacking group Anonymous first turned its eye on Iran, a group calling themselves The Sword of Anon released image of Saif al-Adl a high level member of al-Qaeda alongside number other member located in Tehran,…
Pegasus Spyware and the commercialization of spying
Guest written by: Laurrits Vestergaard Spying on personal communications is not new, it has been undertaken by governments for decades. However, the discovery of the extent of use of the Pegasus spyware in 2016 and subsequent research by Citizen…
What actually is a strong password?
Guest written by: Laurits Vestergaard What actually is a strong password? Increasingly our lives are online, thought innumerable online accounts all of which require a password. There are constant stories of data breaches and hacks where hackers have taken advantage…
Is Physical security missing from your cybersecurity policy?
Physical security is an often forgotten or overlooked part of a corporate cybersecurity policy. To be effective a cybersecurity policy must be able to counter a cyberattack at any stage of what cyber experts call a cyber-kill chain. …























