SEVN-X Blog
A Blog for Nerds
Featured Post
Let's Talk Ransomware
While it’s not surprising that a quick Google search brings up quite a few jokes on the topic, ransomware is definitely ...
Phishing, Ransomware, Breaches: Protect Your Organization
Bad actors will always be looking for a good payday. Below are a few key things that you can do to help keep your users,...
COVID-19 Vaccine and Research Scams
The Video Vaccines are Trending November has certainly had the world in a tizzy with the US election, the surge in COVID...
Source Code for Windows XP, 2003, and More Leaked
What happened? If you trust the Internet, the story goes like this: a leaker, that goes by the handle billgates3, amasse...
Building Breach Resiliency Through Collaboration
Setting the Stage With the release of the latest Verizon Data Breach Investigations Report it is encouraging to see that...
Back to [Virtual] School
The Video With the school year starting up (from home), families are facing a number of new challenges. To avoid adding ...
Text Message Scams
The Video The Newest Scam in Town Remember the saying, "There's an app for that."? Well now it seems that may apply to t...
Stay Steps Ahead With Assumed Breach Testing
What's The Big Deal Assumed Breach Penetration Testing is intended to emulate an attacker that has already achieved a le...
To SAST, or to DAST, That is the Question
While implementing secure coding guidelines, enforcing strict code review processes, providing our developers the necess...