T-Plaza, 4th Floor, Thika, Kenya
+254 703 412 771

Category: Technology & Business

Do Your Business, We Secure

Samba Shares Exploitation – Walkthrough

TryHackMe: Kenobi Written – June 14th, 2022 Hello there, Today we look at “Kenobi” on TryHackMe. You can find the link to the room here: https://tryhackme.com/room/vulnversity. For this room one can opt to use the attack box which is straightforward. However, you could also opt to use OpenVPN, in case you are not familiar with…
Read more

Setting up a phishing campaign with Gophish- Walkthrough

Hi everyone, welcome back to our blog, today we will be talking about Gophish as a tool for performing phishing campaigns. Before we begin be sure to check out our other blogs on our website :https://yelbridges.co.ke/category/tech-business/ . . . Introduction to Phishing It is often said that when it comes to security the weakest link…
Read more

Remote Procedure Call Runtime Remote Code Execution Vulnerability CVE-2022-26809

Every 2nd Tuesday of every month Microsoft releases security updates for its windows operating system, dubbed “Patch Tuesday”. And this past Tuesday, pun intended, the 12th of April 2022, a number of updates were released that should have you concerned. Here’s why Of the 128 vulnerability fixes released, a significant number (10) have a CVSS…
Read more

Attacking ICS Plant – Walkthrough

Hi everyone, welcome to our blog on attacking Industrial Control System (ICS) #1. Here is the link to this room: https://tryhackme.com/room/attackingics1 . We also have walkthroughs for eternal blue exploit or “Blue” as is referred to by try hack me and a privileges escalation walkthrough for the try hack me room vulnversity, the links to…
Read more

Mobile Banking fraud rising in Kenya 

The Kenyan financial sector has inevitably found itself unable to resist technological indulgence.  The wave of offering customer’s alternative channels has been largely driven by MPESA penetration across the county.  Banks, MFB, SACCOs, are offering digital channels that have laid a strong base for low cost banking and have extended banking services beyond the branch…
Read more

Linux Privilege Escalation – Walkthrough

Hello there, welcome to our walkthrough on the “Vulnversity” room from TryHackMe. Here is the link to the room: https://tryhackme.com/room/vulnversity. For this room one can opt to use the attack box which is straightforward, you could also opt to use OpenVPn, in case you are not familiar with how connect via OpenVPN, please visit https://tryhackme.com/room/openvpn.…
Read more

Eternal Blue Exploitation – Walkthrough

Many organization have this as an existing vulnerability on there network as most of the machines vulnerable to this exploit are running legacy systems or the users not comfortable migrating to the newer versions of windows, or the systems Admins are lazy to update the systems. But what is the risk of this? below is…
Read more

We lead by taking action

YELBRIDGES LTD ACHIEVES ISO 27001 CERTIFICATION FOR INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS). Yelbridges – ISO 27001 Compliant Yelbridges Limited a cyber security market leader in East Africa is pleased to announce that the company has achieved ISO/IEC 27001 Certification for Information Security Management System (ISMS). The certification is a strong demonstration of Yelbridges Limited commitment…
Read more

Re-Invent During Crisis

You never have a real change unless you have a time of crisis – Friedman Milton Covid-19 pandemic has caused a global health emergency as well global economic slowdown. Businesses operations have been negatively impacted as the covid-19 keeps on spreading globally. Government have also introduced regulations and guidelines with the aim of containing the…
Read more

What CEO’s needs to know about Cyber Security

Cyber attacks of the day are vicious and lead to massive financial losses to organization. When such incidents occur, the CEO is left answerable and accountable on to the stakeholders – Regulators/government, shareholders/investors, customers and employees on what led to the attack and could it have been avoided. The irony of the situation is that…
Read more


Powered by WhatsApp Chat

× WhatsApp Us...