top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


Understanding the Latest Clickjacking Vulnerability in Password Managers: A Technical Deep Dive
Image of the Kill Chain In the ever-evolving landscape of cybersecurity threats, a new zero-day vulnerability has emerged that targets...
5 min read


How Hackers Bypass MFA in Microsoft 365 — and How to Detect and Stop Them
Learn how hackers use Microsoft 365 MFA bypass to gain access, add persistence, and exfiltrate data. Detect attacks with KQL queries and stop them fast.
5 min read


Ransomware and Malware Analysis Techniques in 2025: A Comprehensive Guide
In 2025, ransomware and malware analysis have become more critical than ever as cyber threats evolve with sophisticated tactics like data...
4 min read


Microsoft 365 Direct Send Phishing: How Internal-Looking Emails Bypass Defenses
Phishers are increasingly abusing a little-known Microsoft 365 feature called Direct Send to make malicious emails appear to come from...
5 min read


Understanding the ToolShell Vulnerability in Microsoft SharePoint Servers
In the ever-evolving landscape of cybersecurity threats, Microsoft SharePoint servers have become a prime target for sophisticated...
5 min read


Deep Dive into NightEagle APT: Technical Breakdown of the Zero-Day Microsoft Exchange Exploitation
At Inception Security, our mission is to equip organizations with the knowledge and tools to combat advanced cyber threats. As experts in...
5 min read


Understanding the Mockingjay Malware
Cybersecurity is a lot like a game of chess. You must anticipate your opponent's moves and devise strategies to stop them. But what...
3 min read


Understanding and Mitigating the MOVEit Transfer CVE-2023-34362 Vulnerability
On May 31, 2023, Progress released a security advisory for their MOVEit Transfer application detailing a SQL injection vulnerability...
3 min read


Understanding the CVE-2023-27997 Heap-Based Buffer Overflow
The cyber threat landscape is a constantly evolving space where new vulnerabilities are discovered and old ones are patched up. However,...
4 min read


Securing Your Business: The Benefits of a Managed Security Service Provider
Cyber threats are on the rise, and businesses are increasingly finding themselves in the crosshairs. Many businesses struggle to manage...
3 min read


Royal Ransomware Group
Since September 2022, cybersecurity threats have taken a new turn with the advent of the Royal ransomware variant. These cybercriminals...
4 min read


CVE-2023-27350 PaperCut and Bl00dy Ransomware Gang
The vulnerability CVE-2023-27350 enables remote actors to sidestep authentication and execute remote code on several versions of PaperCut...
3 min read


Multi-Factor Authentication: Why Every Business Should Implement It and How to Get Started
In today's digital age, businesses of all sizes face an ever-growing number of cybersecurity threats. Protecting sensitive information...
2 min read


Phishing Attacks and Social Engineering: Recognizing the Signs and Preventing Exploitation
In today's digitally connected world, cybersecurity is no longer optional—it's a necessity. At Inception Security, we know that the only...
2 min read


The Human Factor in Cybersecurity: Best Practices for Employee Training and Awareness
In the rapidly evolving digital landscape, cybersecurity is paramount for businesses of all sizes. While organizations invest heavily in...
3 min read


Shimcache: A Crucial Tool for Digital Forensics and Incident Response
Shimcache, also known as the Application Compatibility Cache, is a feature in the Windows operating system that tracks application...
2 min read


Understanding the Dark Web: What Every Business Owner Needs to Know
The Dark Web can be daunting and mysterious, often associated with criminal activity and hidden dangers. As a business owner, it's...
3 min read


Why You Should Block Microsoft Legacy Authentication and How to Do It
As an IT security specialist, Inception Security understands the risks of using outdated authentication methods like Microsoft Legacy...
2 min read


The Top 5 Cybersecurity Threats Businesses Face in 2023
As we progress through 2023, businesses rely more on technology than ever before. With this increased reliance comes an increase in cyber...
3 min read


Top 5 Reasons to Invest in a BEC Assessment for Your Business
In today's fast-paced digital world, businesses face numerous cybersecurity threats. One of the most prevalent and financially damaging...
2 min read
bottom of page