What is PCI-DSS Compliance

The Payment Card Industry Data Security Standard (PCI DSS) is a data security standard for businesses that deal with major credit card systems’ branded cards.

Read More »
SOX Compliance

Fundamentals of SOX Compliance

Sox (the Sarbanes-Oxley Act) was a federal law introduced in the United States in 2002 that established new corporate accountability rules to guard against financial scandals like the Enron Corporation’s.

Read More »

Aquil Ahmad

SysYork Technologies

Dynamic & Details -Oriented with over 17 years of experience ranging from  IT Security, IT Service Operations, End User Services, Remote Infrastructure Management, Data Center Operations, Customer Relationship Management, Service Desk Operations, Cyber Risk and Compliance Management to Third Party Vendor Management .

Aquil Ahmad


Call us

Would like to partners with us and figure out solutions for you ?
  • Social Engineering for Espionage and Influence

    Microsoft has disrupted operations carried out by a Russian government-aligned threat actor tracked as “SEABORGIUM.” The threat actor uses phishing and credential harvesting to conduct espionage and information operations. SEABORGIUM typically focuses on organizations in Western countries, although it began targeting some Ukrainian organizations shortly before Russia invaded Ukraine.

  • More Super Targeted Spear Phishing Ahead

    Hardly a day goes by without a news alert about the latest HUGE data breach. It’s so commonplace today that it rarely rates showing at the top of the news. In a newspaper, the announcement of the latest breach may be on the third page. We’ve become numb to them. And that’s a big problem.

  • Children of Conti go Phishing

    Researchers at AdvIntel warn that three more ransomware groups have begun using the BazarCall spear phishing technique invented by the Ryuk gang (a threat group that subsequently rebranded as Conti). BazarCall callback phishing allows threat actors to craft much more targeted social engineering attacks designed for specific victims. The researchers outline the four stages of this technique:

  • CyberheistNews Vol 12 #33 [Eye Opener] Recent Cisco Hack by Ransomware Group Started Because of a Phishing Attack
  • Initial Access Broker Phishing

    Cisco has disclosed a security incident that occurred as a result of sophisticated voice phishing attacks that targeted employees, according to researchers at Cisco Talos. The researchers believe the attack was carried out by an initial access broker with the intent of selling access to the compromised accounts to other threat actors.