Cybersecurity in 2022: It’s Not Getting Easier
As we wrap up the year, it always makes sense to take a look back and see what worked and what didn’t; what we can do better and what we have to ...
Unauthenticated Webpages: Hidden HIPAA Risks on Public-Facing Websites
When we think about HIPAA compliance and websites, the focus often shifts to patient portals, online scheduling systems, and other secure areas requiring user authentication. However, it’s crucial to recognize that even ...
Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption
The recent massive telecom hack by the Chinese state-sponsored group Salt Typhoon has highlighted critical vulnerabilities in traditional communication systems. The breach targeted major U.S. telecom providers, including Verizon, AT&T, and T-Mobile, ...
Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on ...
DEF CON 32 – Cultivating M4D SK1LLZ In the DEF CON Community
Authors/Presenters: Yan Shoshitaishvili, Perri Adams Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas ...
Addressing BYOD Vulnerabilities in the Workplace
Secure the workplace of today by exploring how to address BYOD vulnerabilities Bring Your Own Device (BYOD) policies have become commonplace in many workplaces. Employees use personal smartphones, tablets, and laptops to ...
The 3 Most Common Misconceptions About Workplace Violence
Learn how to overcome C-suite resistance to investing in workplace violence prevention programs — keeping your business safe and strong Introduction Misconception 1: “Don’t worry, we’ll know it when we see it.” ...
Breaking the Air Gap Through Hardware Implants
IoT security assessments expose diverse technologies, use cases, and protocols. While wireless components like WiFi and Bluetooth enhance functionality and enable features like OTA updates, they also increase the attack surface. This ...
Randall Munroe’s XKCD ‘The Maritime Approximation’
via the comic humor & dry wit of Randall Munroe, creator of XKCD Permalink ...
BTS #43 – CVE Turns 25
In this episode, Paul Asadoorian, Alec Summers, and Lisa Olson discuss the 25th anniversary of the CVE program, its evolution, and the importance of transparency in vulnerability management. They explore the history ...
Podcast Episode 21: Interview with the University of Richmond’s CTF Winning Team
What happens when passion, talent, and opportunity collide in the university’s tech scene? Meet David Nathanson and Daniel Garay, the freshmen duo who took the University of Richmond’s Capture the Flag (CTF) ...