Agricultural Supply Chain Attack
(By: William Beard on September 30, 2021) Executive Summary The agricultural sector has been hit with yet another cyberattack in 2021. New Cooperative a Iowa based grain collective was hit ...
Agricultural Supply Chain Attack
(By: William Beard on September 30, 2021) Executive Summary The agricultural sector has been hit with yet another cyberattack in 2021. New Cooperative a Iowa based grain collective was hit ...
Apple Zero Click iMessage Exploit
(By: William Beard on September 17, 2021) Executive Summary Citizen Labs, a research group at the University of Toronto recently discovered a vulnerability in all of Apple’s operating ...
Security+ SY0-501 Domain 3 Architecture and Design: A look into Proper Input Validation
(By: Guy Nguyen-Phuoc on March 3, 2021) Introduction The best way to stop a disaster is to prepare for it and cyber disasters are no different. Architecture and design, defined by the ...
(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction In 2016, the Central Intelligence Agency (CIA) experienced a data breach containing up to 34 terabytes of data (34,000,000,000,000 ...
Security+ SY0-501 Domain 2 Technologies and Tools: a look into weak security configurations
(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction CISA (Cybersecurity & Infrastructure Security Agency) released an alert from their National Cyber Awareness System on April 29, ...
Security+ SY0-501 Domain 6 Cryptography and PKI: A look into AES and Encryption
(By: Guy Nguyen-Phuoc on October 16, 2020) Introduction April 20, 2020. The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) ...
Responding to a Cyber Security Incident
What is a Cyber Security Incident? A Cyber Security Incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security ...
On February 12, 2019, The Federal Trade Commission (FTC) release an article warning of the dangers of the Romance Scams. In a Romance Scam, cyber criminals gain the confidence/trust of their ...
DNS allows a user to type a Uniform Resource Locator (URL) into the browser which sends the user the requested website. In the background, DNS servers are communicating with each other to resolve ...
Businesses are highly affected by email scams. One scam reaching critical level is the W-2 scam. The scam is aimed toward the HR department of an organization using sophisticated phishing ...