Is Automation in Fast Food Chains a Boon or a Bane?Automation in fast food chains, particularly through kiosks for order-taking, has become a growing trend. While this innovation offers…Nov 26, 2024Nov 26, 2024
Strengthening Cybersecurity for Digital Financial Platforms: Lessons from GCashWay back in 2016, I was part of Globe Telecom, and one of the products I commonly checked was the GCash application. GCash was dominating…Nov 23, 2024Nov 23, 2024
Facebook Account Phishing — How Hackers takeover your accountIt has been a while since I published an article. I took a hiatus from writing blogs related to breaches and leaks due to threats from…Jan 16, 2024Jan 16, 2024
DMCI Holding Leak — RAGNAR_LockerGood day everyone, it’s been a month since my last article but today i’m sharing with you about the incident we discover yesterday.Oct 14, 2022Oct 14, 2022
Smishing/Phishing Investigation — Threat HuntingInvestigating a phishing campaignAug 29, 20221Aug 29, 20221
Philippine Government Leaks Historical Data (2015–MAY 2022)Disclaimer: There is no direct connection or any illegal access perform during the research. The author is not liable to any information…Jul 11, 2022Jul 11, 2022
TÜV NORD — Hit By Ransomware BlackBasta GroupDisclaimer: There is no direct connection or any illegal access perform during the discovery of this incident. The author is not liable to…Jun 30, 2022Jun 30, 2022
Office 365 Scam/Phishing page available online — Free Link Download Posted in a Hacking ForumDespite of having fancy network security tools, end-point security installed in all your corporate devices to prevent malicious…Jun 29, 2022Jun 29, 2022