SecurityWall Logo
SecurityWall Blog

Cybersecurity Insights & Expertise

Stay ahead of evolving threats with expert analysis, industry trends, and practical cybersecurity guidance from our team of security professionals.

Featured Article

Enhance Your Cybersecurity with SecurityWall: PTA Approved Cybersecurity Audit FirmFeatured
Security Audit4 min read

Enhance Your Cybersecurity with SecurityWall: PTA Approved Cybersecurity Audit Firm

In an increasingly digital world, safeguarding sensitive information and protecting against cyber threats have become critical for businesses and organizations. To ensure comprehensive cybersecurity, it is vital to partner with an approved and well-certified firm. SecurityWall – is an esteemed name in the cybersecurity industry and one of the approved security audit firms by the Pakistan Telecom Authority (PTA). Recognizing this, the Pakistan Telecom Authority (PTA) took a proactive step by iss

HM

Hisham Mir

Dec 3, 2025

Read More
Search Articles
Categories
Popular Tags
Security AuditCompliancePTACertificationSecurityForensicsPhysical SecurityDetectionVulnerability AssessmentZoom

Latest Articles

Sort by:
Art of Detecting and Locating Hostile Recording Devices
Security
Dec 3, 20254 min read

Art of Detecting and Locating Hostile Recording Devices

Whether you work in corporate government or private security it’s vital to stay one step ahead and identify hidden recording devices before they can compromise you.⁣ Detecting, locating, and identifying surreptitious surveillance devices has become more complex. Before the proliferation of active transmitters for information gathering purposes, the passive listening device was predominant. Such devices are not easily detected by conventional means due to their small size and low power consumptio

SecurityForensicsPhysical Security
HM

Hisham Mir

Dec 3, 2025

Read More
Zoom - Tail of High Severity Vulnerabilities
Vulnerability Assessment
Dec 3, 20256 min read

Zoom - Tail of High Severity Vulnerabilities

Since we all are stucked at home due to Coronavirus, So to maintain our work and communicate with team, workers, and employees we all are using video conferencing. Zoom got more popularity in these quarantine days for remote video conferencing and seems to be offering a lot. We can guess its popularity that even Boris Johnson uses Zoom for cabinet meetings. Things went crazy when their meeting id got public   539-544-323 After that shone a spotlight on the company’s security protections and pri

Vulnerability AssessmentSecurityZoom
HM

Hisham Mir

Dec 3, 2025

Read More
Cyber Security Prediction for 2019 - Threat Intelligence
Threat Intelligence
Dec 2, 20183 min read

Cyber Security Prediction for 2019 - Threat Intelligence

Cybersecurity Threat Predictions for 2019: Article include brief about prediction from different firms. Including Fortinet,McAfee,and FlashPoint. Cyber Security can't be ignored anywhere but 2019 predicts too much, Yes! expect credit card, data, theft to continue to rise. Yes, this isn’t a major surprise; however, if organizations can better address the reasons for the rise, they will be better for the journey in 2019. Cyber criminals are expected to become more sophisticated and collaborativ

Threat IntelligenceCybersecurityPredictions
HM

Hisham Mir

Dec 2, 2018

Read More
Security Researcher saved Careem from a Data Breach
Data Breach
Jun 16, 20173 min read

Security Researcher saved Careem from a Data Breach

Careem App is a car booking platform based in UAE which offers travelling services by which people can book a car on their doorstep in a couple of minutes. Careem App is known for its pick and drop service with the most comfortable and safe environment all over UAE, PAKISTAN, AFRICA and more countries. But, what if this multinational organization gets comprise by hackers and their billion dollars worthcustomer’s data gets leak. They’d have nothing to do except regretting. SecurityWall team tend

Data BreachSecurity ResearchVulnerability Disclosure
HM

Hisham Mir

Jun 16, 2017

Read More
WannaCry - Detail Analysis and Remediation
Ransomware
May 16, 20173 min read

WannaCry - Detail Analysis and Remediation

WannaCry is now a hot topic in cyber world as it is been reported in more than 150 countries around the globe, affecting thousands of machines and many companies with its encryption. News came to circle when National Health Service (NHS) was under attack of WannaCry where it infected almost all National Health Service machines but steadily it spread into other parts of country and then into other continents. So a question arise how this all happened? The ransomware was first seen on Friday and s

RansomwareMalware AnalysisCybersecurity
HM

Hisham Mir

May 16, 2017

Read More
How Team SecurityWall Hacked & Traveled FREE
Security
Mar 30, 20173 min read

How Team SecurityWall Hacked & Traveled FREE

Did you ever thought about traveling around without any penny? YES? We just did it Due to low attention over securing of an online system local companies may dont know but they are compromised and hackers are enjoying the fruit on back end. This is the most modern attack vector now a days, keep digging and dont let the authorities nor make it public. SecurityWall team tends to secure Pakistan cyber space and secure our local applications online existance, We have helped many local brands but t

SecurityPenetration TestingEthical Hacking
HM

Hisham Mir

Mar 30, 2017

Read More