Blog

Technical writeups and articles covering cybersecurity topics, incident analysis, and best practices.

Quishing: QR Code Phishing

November 2025

Exploring the emerging threat of QR code phishing (quishing) and how cybercriminals exploit QR codes to bypass traditional security measures. Learn about prevention techniques and why this attack vector is growing in popularity.

Read More →

PowerSchool Data Breach

January 2025

Analysis of the recent PowerSchool data breach affecting student and teacher information across multiple school districts. Exploring the implications of ransomware attacks on educational systems and the importance of proper cybersecurity measures in schools.

Read More →

U.S. Department of the Treasury Hack

March 2025

Investigating the Chinese state-sponsored cyber attack on the U.S. Treasury Department. Examining how third-party security tools became the entry point for attackers and what this means for national security.

Read More →

Medusa Ransomware

March 2025

Deep dive into Medusa ransomware-as-a-service (RaaS) and its impact on organizations and individuals. Understanding how these attacks work, prevention strategies, and the dangers of paying ransoms.

Read More →

Hertz Data Breach

April 2025

Examining the Hertz data breach caused by a zero-day vulnerability in Cleo file-sharing software. Analyzing how third-party tools continue to create security risks and what companies can do to protect customer data.

Read More →