top of page



DopplePaymer attackers demand $17 million ransom from a laptop maker
On November 9, 2020, It was reported by BleepingComputer.com that Compal Electronics suffered a DopplePaymer ransomware attack where...


Secure Coding
What is Secure Coding? Much of the world today runs on software applications, which include parts of our daily lives. But how can we make...


Using Deep Learning Neural Networks to Play Asteroids: Part 1
I’m Ernesto Felan and this is my engineer takeover post for Hacware Inc. I have been working at Hacware for about a year learning a lot...


1st Election Ransomware Attack hits Georgia
Earlier this month on October 7th, in Hall county which is 1 hour north of Atlanta, Georgia, they had a ransomware attack that breached...


Memetic Memory: What Memes Can Teach Us About Machine Learning
I am a software developer at Hacware, where I currently am working with a team of software engineers to build a machine-learning driven...


Hacker’s Next Target? Your Young, Beautiful, And Broke Employees.
These phishing attacks will cost your company BIG time and BIG money. New Age Phishing is all about the Data The new-age hackers are...


The Capital One Breach, a Familiar Catastrophe
Over 100 million Capital One accounts, including 140,000 Social Security numbers and over 80,000 linked bank accounts, all recently...


How to share passwords?
As a business grows the delegation of responsibilties grows with it. This includes employees having to take up new roles. Alot of times...


How to Pen Test your Small Business?
What is it? Penetration Testing a.k.a pen testing involves a team of cyber security experts who attempt to break into your company’s...


No Gambling on Email Security at Las Vegas
A Brief Black Hat 2019 Retrospective When I first set foot inside the Mandalay Bay Convention Center for Black Hat, my first thought was...


Hacware Engineer Takeover! A Board Game Recommendation Engine
Hi everyone! My name is Trenton Goins, and I am very excited to be running Hacware’s Engineer Takeover this month! I am Hacware’s newest...


How to Set Up a Phishing Campaign with Gophish
What is Gophish? Gophish is open-source software phishing simulation software. In this article, I will explain how to set up and manually...
bottom of page