top of page
Work Overview
LATEST PROJECTS
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque

Blog
Search


Deep Dive into NightEagle APT: Technical Breakdown of the Zero-Day Microsoft Exchange Exploitation
At Inception Security, our mission is to equip organizations with the knowledge and tools to combat advanced cyber threats. As experts in...
5 min read


CVE-2023-27350 PaperCut and Bl00dy Ransomware Gang
The vulnerability CVE-2023-27350 enables remote actors to sidestep authentication and execute remote code on several versions of PaperCut...
3 min read


Phishing Attacks and Social Engineering: Recognizing the Signs and Preventing Exploitation
In today's digitally connected world, cybersecurity is no longer optional—it's a necessity. At Inception Security, we know that the only...
2 min read


The Human Factor in Cybersecurity: Best Practices for Employee Training and Awareness
In the rapidly evolving digital landscape, cybersecurity is paramount for businesses of all sizes. While organizations invest heavily in...
3 min read


Understanding the Dark Web: What Every Business Owner Needs to Know
The Dark Web can be daunting and mysterious, often associated with criminal activity and hidden dangers. As a business owner, it's...
3 min read


Top 5 Reasons to Invest in a BEC Assessment for Your Business
In today's fast-paced digital world, businesses face numerous cybersecurity threats. One of the most prevalent and financially damaging...
2 min read


7 Reasons Why Businesses Need TableTop Exercises
Top Reasons Why Incident Response Table Top Exercises Are Important In today's digital world, cyber threats are becoming more...
3 min read


5 Reasons Why Risk Assessments are Important for Businesses
In today's digital age, cybersecurity threats are on the rise, and it's more important than ever for businesses to take proactive...
3 min read


Understanding ManageEngine Vulnerability CVE-2022-47966
ManageEngine's CVE-2022-47966 vulnerability is a critical issue that allows an attacker to gain remote code execution on the server...
2 min read


Understanding the Exchange Server Attacks: Exploiting CVE-2022-41040 and CVE-2022-41082
In recent months, we have seen a surge in attacks targeting Exchange Servers. These attacks have been made possible by exploiting the...
2 min read


Play Ransomware Group
The Play ransomware group has been making headlines recently due to its use of a new method to exploit vulnerabilities in Microsoft...
3 min read


Citrix CVE-2022-27518
Citrix is a global leader in providing digital workspace solutions, and as such, it is a popular target for cyber attackers. One such...
3 min read


Citrix CVE-2022-27516
CVE-2022-27516 is a severe vulnerability recently discovered in Citrix, a widely-used software program. This vulnerability has the...
2 min read


Fortinet CVE-2022-42475
CVE-2022-42475 is a recently discovered vulnerability in the software that powers Fortinet, a popular cybersecurity company. This...
2 min read


Forensic Friday - Jump Lists
What are Jump Lists? Jump Lists are windows features introduced with Windows 7, and they contain information about recently accessed...
2 min read


Remote Assistance Tools - T1219
Let's talk about remote assistance tools! As you would expect, a remote assistance tool is used to assist end-users from a remote...
2 min read


Microsoft Office - Arbitrary Code Execution
We have recently observed threat actors evolving their procedures in light of Microsoft disabling macros by default in office documents....
3 min read


Stale Active Directory User Accounts
A user account is created in Active Directory for each user in your environment. Over time as users leave the organization, their...
3 min read


Cyber Insurance Benefits
What is Cyber Insurance? A cyber insurance policy is commonly called "cyber risk insurance" or "cyber liability insurance" coverage. It...
3 min read


Forensic Friday - Profile Lists
What are Profile Lists? Windows keeps track of user-profiles and their locations in the registry. The profile location is stored under...
3 min read
bottom of page