Security Solutions

SME/SMB to large global organisations security architecture, design and implementation. Vendors include Checkpoint, Cisco, Juniper, McAfee, Sophos, and Dell SonicWall etc…..

Infastructure Solutions

End-to-end infrastructure projects (development and delivery) involving end users computing, data, system, telecom, network and security. It has survived not only five centuries.

Web Design Services

We are a team who are passionate about technical knowledge. We learn, grasp and master new skills quickly and execute them professionally and with precision.

Subscribe to our newsletter.

We are the team who are passionate to technical knowledge. We learn new things quickly and execute professionally. We are driven by a desire to make things we can all be proud of. We believe that as a team we can achieve more than as individuals, coz working with others and sharing ideas can create unique designs.....

LATEST BLOGS

Post 2

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque quis nulla vel dolor ultrices blandit nec sit amet. turpis, ipsum dolor sit amet, consectetur adipiscing elit.

Read more

Test Post 1

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Quisque quis nulla vel dolor ultrices blandit nec sit amet. turpis, ipsum dolor sit amet, consectetur adipiscing elit.

Read more

RSS LATEST NEWS

  • CCleaner Command and Control Causes Concern September 20, 2017
    This post was authored by Edmund Brumaghin, Earl Carter, Warren Mercer, Matthew Molyett, Matthew Olney, Paul Rascagneres and Craig Williams. Note: This blog post discusses active research by Talos into a new threat. This information should be considered preliminary and will be updated as research continues. Introduction Talos recently published a technical analysis of a backdoor which was included with version 5.33 of the CCleaner […]
    Talos Group
  • CCleanup: A Vast Number of Machines at Risk September 18, 2017
    This post was authored by: Edmund Brumaghin, Ross Gibb, Warren Mercer, Matthew Molyett, and Craig Williams Introduction Supply chain attacks are a very effective way to distribute malicious software into target organizations. This is because with supply chain attacks, the attackers are relying on the trust relationship between a manufacturer or supplier and a customer. […]
    Talos Group

Partner's Logo