Call for a ballpark estimate for your project in 1 business day

Deep Dive and Design

We can analyze any thorny process and business function flow. We have the right tools and expertise to help you do a deep dive and clarify your requirements that will help your business move and grow with your custom software.


We specialize in large and complex software development projects. We have over 50 years of joint professional software development experience. Whether it is web applications, cloud applications or desktop applications, we can provide custom tailored solutions to meet your business needs for the present an the future.

Support and Validation

Supporting a complex software platform requires the effective use of both preventative measures as well as rapid critical incident response to resolve problems quickly. Whether it’s an occasional problem or a fully managed support offering we have a support service to suit your needs.

NetSupport RAT spread through Fake Coronavirus Report Emails

The unique Excel files in this campaign use highly obfuscated formulas, but all of them connect to the same URL to download the payload. Researchers have been seeing a steady increase in the use of malicious Excel 4.0 macros in malware campaigns. In April, these Excel 4.0 campaigns jumped on the bandwagon and started using COVID-19 themed lures. The phishing emails pretends to come from the Johns Hopkins Center, which researches epidemics and disasters. The emails are titled WHO COVID-19 SIT ...

Sarwent Malware Opens RDP Ports For Future Attacks

Sarwent is a little-known backdoor Trojan, which has been around since 2018. Previous versions were limited to a few functions such as downloading and installing additional malware. The malware is now able to execute any commands via the command prompt or PowerShell. Sarwent create a new user account, activate the RDP service and configure the Windows firewall for external access. The new Windows account then serves as full access to the infected host. It complicates cleaning up an affected sy ...

Phishing Campaign Impersonates U.S. Treasury To Steal Taxpayer Credentials

Researchers originally identified the malware as the Adwind RAT, but it is actually a new Node.js malware-based remote access trojan that it discovered. This malware, called QNodeService, was analyzed by researchers at TrendMicro. The malware hidden in weaponized attachments can access saved passwords, microphones and webcams, and can log keystrokes. ...

Covid-19 phishing Attack Spreads Agent Tesla Malware

Researchers outlined how three campaign variants deployed payloads to capture keystrokes, take screenshots, and dump browser passwords, then sent this data to an e-mail server. Stolen data could include financial credentials, screenshots, and email and social media credentials. This data can later be used for digital crimes, including financial crimes. Hackers can abuse stolen information like trade secrets, customer data, and client information for ransom or to sell trade secrets to a compe ...