Website Cloning: How Do Hackers Do Things

Website Cloning: How Do Hackers Do Things

In our third episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, shows you how hackers can make a copy of a website and clone it for their own malicious purposes. During this video, Josh will show you how hackers are cloning websites using...
Malicious Email Harvesting: How Do Hackers Do Things

Malicious Email Harvesting: How Do Hackers Do Things

In our second episode of How Do Hackers Do Things, GraVoc Security Consultant, Josh Jenkins, shows you how hackers harvest email addresses for malicious purposes. During this video, Josh will show you how hackers use a variety of paid and non-paid OSINT (Open-Source...
Shodan: How Do Hackers Do Things

Shodan: How Do Hackers Do Things

We are excited to introduce our new video series, How Do Hackers Do Things! How Do Hackers Do Things will focus on different methods of hacking that cybercriminals use to exploit their victims. Our goal is bring awareness to the vulnerabilities and hacking methods...
Update on SolarWinds Cyberattack

Update on SolarWinds Cyberattack

Last week, SolarWinds announced that its Orion platform was compromised in a sophisticated cyberattack that ultimately used the platform’s update server to distribute malware to over 18,000 SolarWinds customers. While GraVoc does not have the SolarWinds Orion platform...
Security on Azure

Security on Azure

During our VDI Explained webinar, our Director of Risk Management & Audit, Brian Brunelle, explored the security benefits of Azure.Microsoft Azure is a cloud computing service created by Microsoft for building, testing and managing various applications through...

Pin It on Pinterest