Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.

Development

We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

Covid-19 phishing Attack Spreads Agent Tesla Malware

Researchers outlined how three campaign variants deployed payloads to capture keystrokes, take screenshots, and dump browser passwords, then sent this data to an e-mail server. Stolen data could include financial credentials, screenshots, and email and social media credentials. This data can later be used for digital crimes, including financial crimes. Hackers can abuse stolen information like trade secrets, customer data, and client information for ransom or to sell trade secrets to a compe ...

Fraudulent COVID-19 Relief Claims Earn Gang Millions

In addition to the fraudulent unemployment activity, researchers have also found evidence that links Scattered Canary to previous attacks targeting CARES Act Economic Impact Payments, which were meant to provide Covid-19 relief. Researchers have identified the methods Scattered Canary is using to create numerous accounts on government websites and where the stolen funds are directed. So far, the gang has targeted the unemployment websites of Florida, Massachusetts, North Carolina, Oklahoma, Rh ...

WolfRAT Malware Targets WhatsApp, Facebook Messenger

Chat details in WhatsApp records, messengers and SMSs of the world carry some sensitive information and people forget these can happen on their phone. WolfRAT specifically targets a highly popular encrypted chat app in Asia called Line, which suggests that even a careful user with some awareness around end-to-end encryption chats would still be at the mercy of WolfRAT. ...

REvil Ransomware Attack

The New York-based firm, Grubman Shire Meiselas & Sacks, offers legal services to the entertainment and media industries. Hackers hit the law firm in an attack using the REvil ransomware. The stolen information includes clients' phone numbers, email addresses, personal correspondence, contracts, and non-disclosure agreements with ad and modeling firms. ...