Author Archives: Buja Atdhe

About Buja Atdhe

CEO of the platform


A hacker Thursday afternoon published what he says is the decryption key for Apple iOS’ Secure Enclave Processor (SEP) firmware. The hacker, identified only as xerub, told Threatpost that the key unlocks only the SEP firmware, and that this would … Continue reading

Posted in News | Tagged , , , | Leave a comment

The 8th Annual Billington CyberSecurity Summit

The 8th Annual Billington CyberSecurity Summit on September 13 will attract over 1000 attendees at the Leading Fall Forum on Cybersecurity in the nation’s capital. The Summit will bring together world-class cybersecurity thought leaders to engage in high-level information sharing, unparalleled … Continue reading

Posted in News | Leave a comment

FireEye report: hacking group APT28 and their tradecraft

FireEye has released a report which discusses the tools-of-the-trade used by what it names APT28, the group of Russian state-sponsored hackers who are carrying out hacks to further promote the Russian political agenda.

Posted in News | Tagged | Leave a comment

APT28 Uses EternalBlue to Spy on Hotel Wifi Networks

Hacker group APT28 is using the EternalBlue hacking tool to spread throughout hotel networks and collect guests’ information. If you’re not yet skeptical of hotel wifi networks, APT28 is giving you a good reason to think twice before logging on. … Continue reading

Posted in News | Tagged , , | Leave a comment

Planning & managing projects

Published on The purpose of this article is to provide a clear overview of the project planning and management processes and to see enough the importance of applying guidelines and standards for successful project management. Here is also used some … Continue reading

Posted in CIO, Home, Risk Management | Tagged , , , | Leave a comment

Is there a real need for e-services or EAs?

Published on In this analysis and special study for PCWorld and CiO Albanian are presented the solutions in providing the appropriate and efficient services at the right time for the citizens / businesses that need it, at the same … Continue reading

Posted in CIO | Tagged , , , , , | Leave a comment

Strategies for developing an Internet emergency response system

Published on Control the flow of information All events occurring in the security field i.e. vulnerabilities, compromises, crashes, different attacks, or cause-of-action takes the basis and the starting point for the information flow. A process or cycle that defines … Continue reading

Posted in CyberSec, Personal Blogs | Tagged , , , , | Leave a comment