Ransomware illustration

Your Data Can Be Kidnapped Too… Ransomware in Action

According to Wikipedia “Ransom is the practice of holding a prisoner or item to extort money or property to secure their release, or it...
IoT Fridge illustration

Can a Refrigerator Compromise the Security of Your Company?

The internet has been invented for a while now. It connected people, images, recording, games, books, and commerce. By people, for people. With the...
Mobile Security

Mobile Security: Connect your brain, not only your device!

Mobile devices often create opportunities. We are now able to access the web from the bus, buy stock options at the hairdresser, check emails...
PwnTillDawn New Events Announcement

PwnTillDawn, The Penetration Testing CTF Events for 2022

wizlynx group is thrilled to announce that PwnTillDawn will be back very soon hosting a new CTF...
Hacker illustrationvideo

NowProtected Secure Browser

NowProtected For your eyes only! E-Banking has become a necessity for many people in today’s world. It minimizes the need to physically visit your bank and...
Privacy Rules Podcast Cover 2

How does Cyber Threat Intelligence relates to data privacy and data...

Your digital identity and Personally Identifiable Information can be used by malicious actors for a variety of purposes. Let’s...
Hacker illustrationvideo

Ethical Hacking & Penetration Testing Services

Leave No Stone Unturned! IT Security is not a feature but a state of mind. It is our vocation. By adopting latest hacking methods and...
- Advertisement -
Ethical Hacking and Penetration Testing

Recent Posts