Arabian Bytes

Recently, the Avecto team travelled to the Middle East for a four-country roadshow, hopping from KSA to UAE, Jordan and finally Lebanon. We travelled with the esteemed Microsoft MVP, Sami Laiho and our partners in the region Crestan, in a bid to spread the message of the importance of back to basics security and for Sami to showcase the simplicity of breaking Windows without the right security foundations in place. ­

Continue Reading


What is customer success?

You may have come across the term Customer Success, and perhaps you thought it was a new concept, or a rehashing of an old concept, or just the latest business fad? In the following the post, I will debunk two of the most common misconceptions about what Customer Success is and then give you my opinion of what Customer Success should, and could be.

Continue Reading


Is social engineering the new norm?

Throughout history humans have sought to socially engineer each other, exploiting social norms and applying pressure to reveal information or gain advantage. From travelling conmen and master spies to cyber threats and phishing emails the fundamental problem is the same, humans can be manipulated.

Continue Reading


How to dismantle an atomic bomb

Security researchers at enSilo recently released a novel code injection technique for Windows known as ‘Atom Bombing’. This is so called because it exploits Windows atom tables and Async procedure calls (APC) to evade detection by many common security solutions.

Continue Reading


An ounce of prevention is worth a pound of cure

Gartner recently published its paper; “The Real Value of a Non-Signature-Based Anti-Malware Solution to Your Organization”, providing insight into how non-signature approaches to malware prevention can not only prevent attacks but offer reduced footprints on the endpoint. As you would expect Avecto is mentioned as one of the vendors in this space.

Continue Reading