Cybersecurity Guidelines for U.S. High-Risk Chemical Facilities Are a Decade Old

Cybersecurity Guidelines for U.S. High-Risk Chemical Facilities Are a Decade Old

The US Government Accountability Office (GAO) has issued a report on the cybersecurity of the high-risk chemical facilities and found serious security issues as the guidance for policies and protection procedures hasn’t ...

Zoom Hacked Accounts, North Korean Hackers, Facebook Senior Pictures

In episode 117 for April 20th 2020: More problems for Zoom with tens of thousands of compromised credentials and zero-day exploits, the $5 million dollar reward for information on North Korean hackers, ...
Zyxel Fixes 0day in Network Storage Devices

Zyxel Fixes 0day in Network Storage Devices

Networking hardware vendor Zyxel today released an update to fix a critical flaw in many of its network attached storage (NAS) devices that can be used to remotely commandeer them. The patch ...
election security

Election Security a 2020 Myth?

As the 2020 election season shifts into high gear, the importance of election security becomes one of the most important issues facing the U.S. Thousands of hours have been spent within government ...
Security Boulevard

Iranian Cyber-Attacks, Ring Class-Action Lawsuit, Preventing Calendar SPAM

In episode 103: The US Department of Homeland Security warns of Iranian cyber-attacks, Ring gets hit with a $5 million dollar class action lawsuit, and some quick tips on how to prevent ...
SQL Injection loses #1 spot as most dangerous attack technique

SQL Injection loses #1 spot as most dangerous attack technique

The Common Weakness Enumeration (CWE), a community-developed compilation of the most critical errors leading to vulnerabilities in software, has lowered SQL Injection from its #1 spot as the most dangerous attack technique ...
Ransomware Attacks Targeting U.S. Cities

Ransomware Attacks Targeting U.S. Cities

Targeted ransomware attacks on local US government entities—cities, schools, and police stations—are on the rise. In this blog learn you'll learn why ransomware attacks are successful, what you can do to minimize ...
US Homeland Security Wants Subpoena Power to Get Data from ISPs about Vulnerable Systems

US Homeland Security Wants Subpoena Power to Get Data from ISPs about Vulnerable Systems

The US Cybersecurity and Infrastructure Security Agency (CISA), in charge of leading national cybersecurity and infrastructure resilience programs, wants a change to federal law that would allow it to inspect systems behind ...
COVID-19

5 Infamous Hacks You Didn’t Know Were Phishes

Despite the common knowledge around phishing, even the most tech-savvy are still falling prey to the tactic. In fact, millennials are more likely to become a phishing victim than their grandparents are ...
Security Boulevard
A Deep Dive on the Recent Widespread DNS Hijacking Attacks

A Deep Dive on the Recent Widespread DNS Hijacking Attacks

The U.S. government — along with a number of leading security companies — recently warned about a series of highly complex and widespread attacks that allowed suspected Iranian hackers to siphon huge ...