top of page
Welcome
to Our Blog


Analysis of DDoS Attacks and Their Implications for Hawaiian Businesses
Introduction In today’s landscape, businesses rely heavily on their online presence to connect with customers, provide services, and...
Francis Borges
Mar 25 min read
161 views


Hackers Disguise Lumma Stealer Malware as Reddit and WeTransfer Pages
In a sophisticated cyber-attack, hackers are exploiting the brand identities of popular platforms such as Reddit and WeTransfer to...
Francis Borges
Jan 233 min read
378 views


2024 Crypto Heist Champions: North Korea’s Escalating Role in the Billion-Dollar Theft Epidemic
Introduction As the world embraces digital currencies, the parallel rise in cyber threats has become an alarming concern. In 2024,...
Francis Borges
Dec 22, 20245 min read
402 views


Navigating IT Challenges in Paradise: How Local Businesses in Honolulu Are Overcoming Obstacles with Dynacomp IT Solutions
Honolulu, a city renowned for its idyllic beaches and vibrant culture, offers a unique backdrop for businesses. Yet, operating in such a...
Francis Borges
Dec 1, 20246 min read
413 views


Gootloader Malware: Resurfaced SEO Poisoning Attacks
It seems GootLoader malware is back in the spotlight this month. This malicious software has been making waves by employing SEO...
Francis Borges
Nov 13, 20243 min read
467 views


Wireless Security Threats: How Tools Like Aircrack-ng, Aireplay-ng, and Airodump-ng Can Be Used to Breach Networks
Hello! In the world of wireless security, understanding potential threats is key to safeguarding your network. While some tools are...
Francis Borges
Nov 7, 20243 min read
334 views


What is Zero Trust Architecture for Business Security?
In the evolving realm of cybersecurity, where threats are increasingly sophisticated and pervasive, businesses need a security approach...
Francis Borges
Oct 24, 20243 min read
354 views


Understanding Penetration Testing: A Comprehensive Guide to Strengthening Business Security
Aloha! Today will be a short post about what Penetration Testing is, the process, and some of the benefits.
Francis Borges
Oct 18, 20244 min read
488 views


The Risks of Video Game Mods: An Easy Way for Malware to Spread
Game modifications, or "mods", have always been a significant aspect of the gaming culture, allowing players to customize and enhance...
Francis Borges
Oct 8, 20244 min read
354 views


Hawaii Health Center Hit By Data Breach
On September 26, 2024, the Community Clinic of Maui, Inc., known as Malama I Ke Ola Health Center, reported a data breach to the Attorney...
Francis Borges
Sep 30, 20245 min read
298 views


Unmasking the Massive AMOS Info-stealer Malware Operation by the Marko Polo Hacker Group
Researchers have recently uncovered a colossal info-stealer malware operation attributed to the infamous "Marko Polo" hacker group.
Francis Borges
Sep 24, 20243 min read
420 views


Fake CAPTCHA Malware Lumma Stealer Targets Windows Users
A new form of malware delivery has emerged, utilizing some hilariously deceptive techniques to target Windows users. This (very) simple...
Francis Borges
Sep 17, 20243 min read
383 views


CovertCatch Malware: North Korean Hackers Using Linkedin for spreading Rustbucket Malware
North Korean threat actors have been detected using LinkedIn to target developers through bogus job recruiting schemes. Utilizing "coding...
Francis Borges
Sep 8, 20243 min read
474 views


What is the "Pegasus Pervert Email" Scam?
What is the "Pegasus Pervert Email" Scam? And why is it in Hawai'i?
Francis Borges
Sep 5, 20243 min read
465 views


The Latest Developments in Phishing: Trends and How to Protect Against Phishing
Today we cover Phishing and other common scams seen in the digital space.
Francis Borges
Sep 3, 20243 min read
178 views
bottom of page