Recently, cyber security researchers at Trellix Advanced Research Center discovered a new and sophisticated attack technique that takes advantage of a powerful yet lesser-known feature of the Microsoft Windows operating system: the "search-ms" URI protocol handler. While the Windows search…
Did you know that over 60% of people use the same password for multiple online accounts? While this may seem convenient, it leaves them vulnerable to hacking attempts. Additionally, a staggering 95% of cyber security breaches are caused by human…
At Labyrinth Cyber, we understand that organisations face an ever-evolving threat of cyber attacks. Safeguarding sensitive data and protecting critical infrastructure have become paramount concerns. To stay one step ahead of potential threats, proactive measures must be taken. One such…
Have you ever wondered what is tailgating in cyber security? Have you ever experienced the thrill of tailgating? No, not the kind that involves sporting events and BBQ parties, but the insidious cyber threat that can compromise your organisation's security…