US and UK Expose New Malware Used by MuddyWater Hackers

This is expected as we continue to see the ongoing conflict between Russia and Ukraine. “US and UK cybersecurity and

Read more

Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive information

Stay informed and stay vigilant. From at least January 2020, through February 2022, the Federal Bureau of Investigation (FBI), National

Read more

Traditional MFA is Creating a False Sense of Security

Traditional MFA is Creating a False Sense of Security Nobody says MFA is 100% will protect you against malicious attackers.

Read more

Learn CyberSecurity through playing Games

You got it right, learn cybersecurity offensive and defensive techniques by playing games. “Cyber competitions are a fundamental element of

Read more

Killware: The Most Dangerous Evolution of Ransomware?

2021 was filled with high-profile ransomware attacks on businesses across industries — some of which (e.g., the Colonial Pipeline attack)

Read more

Russian APT29 Hackers’ Stealthy Malware Undetected for Years

The cybersecurity professionals around the world are busy protecting their client infrastructure. Today is just another day making sure the

Read more

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive

Read more

Destructive malware targeting Ukrainian organizations

Microsoft Threat Intelligence Center (MSTIC) has identified evidence of a destructive malware operation targeting multiple organizations in Ukraine. This malware

Read more

Cyberattack takes down Ukrainian government websites

Ukrainian government servers were hit by a “massive cyberattack” overnight that saw government websites taken down, including the homepage for

Read more

A Brief History of the Cybersecurity Profession

Cybersecurity careers are in high demand, but a closer look at the timeline of network technology and the Internet reveals

Read more