Select Page

HyperQast EP2: The Business of Ransomware

HYPERQAST:  A TECHNOLOGY PODCAST. Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they're digging into topics from Cybersecurity to software development and everything in between!   EP2: The Business of Ransomware Hacking is a...

HyperQast EP1: DLL Search Order Hijacking

INTRODUCING HYPERQAST:  A TECHNOLOGY PODCAST. Hosted by Curious Craig (Craig Stevenson), alongside a bevy of subject-matter experts they're digging into topics from Cybersecurity to software development and everything in between!   EP1: DLL Search Order Hijacking What...

Screen Capture: A Hacker’s Approach

Screen Capture:  What is it?  How do hackers use this technique to gather intelligence? As a sub-technique of “Collection” from the MITRE ATT&CK framework, Screen Capture is where a hacker takes screen shots of their victim's computer while they're using it. ...

Keylogging: A Hacker’s Approach

Keylogging:  What is it?  How does it work?  How do hackers use this technique to gather intelligence? As a sub-technique of “Input Capture” from the MITRE ATT&CK framework, Keylogging is the most prevalent type of input capture hackers use to intercept...

Reconnaissance: A Hacker’s Approach

Have you ever wondered how computers in your network would respond to a hacker coming after them?  And, is the cybersecurity system you have in place able to quickly identify each possible point of entry?  Watch as our CEO Craig Stevenson demonstrates the 2 most...