News
  • “Threat Intelligence Collaboration on the Rise”
    According to a survey conducted by AlienVault at Black Hat USA 2017, the public sharing of cyberthreat intelligence has increased significantly as the cyberthreat landscape continues to evolve. Cybersecurity is a continuous battle as attackers develop…
  • "3 Ways AI Could Help Resolve the Cybersecurity Talent Crisis"
    In order to address the growing problem of the cybersecurity skills gap, organizations must work to cultivate security talent. As indicated by a study conducted by CompTIA in which 600 IT and business leaders were surveyed, the deficiency of…
  • “Equifax Data Breach May Affect Nearly Half the U.S. Population”
    Equifax, a leading credit-reporting firm, has faced a massive breach of data. It has been revealed that personal information including the names, Social Security numbers, birthdates, and addresses of 143 million people within the U.S. were stolen by…
  • “Protecting Systems from Rogue Root Users”
    Root users hold high-level privileges on a network, which allows them to install and manage software or hardware. System administrators within a cloud infrastructure also have root credentials to enable them to maintain operations and performance of the…
  • "Injection Attacks Common in Energy and Utilities Sector: IBM"
    According to a new report that has been released by IBM, the energy and utilities sector has faced a significantly higher increase in attacks in 2017. IBM has also observed that sixty percent of all attacks against the energy and utilities sector in 2016…
  • "Hackers send silent commands to speech recognition systems with ultrasound"
    A team of security researchers at Zhejiang University in China have a developed a method that they call “DolphinAttack”, which could be used to activate voice recognition systems with the use of high-frequency sound waves that are only detected by…
  • "Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy"
    Deception has always been a key strategy in war, politics, and commerce, but now this technique is being utilized more in the battle of cybersecurity. Cybercriminals have applied this technique through the development and launch of cyberattacks such as…
  • "Key-Logging Malware, Dubbed EHDevel, Found Intelligence Gathering"
    Security researchers have discovered complex malware that has been launched by attackers to gather intelligence, particularly targeting Indian and Pakistani individuals. This act of cyber espionage directed toward Indian and Pakistani entities has…
  • "Kansas, Missouri Collaboration Aims to Improve Regional Cybersecurity"
    In support of improving upon regional cybersecurity, agencies in Kansas and Missouri are collaborating in order to develop a strategic framework. The group leading this effort towards improving the cybersecurity of local governments is the Mid-America…
  • "Hackers Gain ‘Switch-Flipping’ Access to US Power Grid Control Systems"
    Security firm, Symantec, has warned that energy companies within the U.S. and Europe have been compromised by a number of cyberattacks, which allowed the infiltration of power grid operations by hackers. With unauthorized access to power grid operations…
  • "10 Tips for Reducing Insider Security Threats"
    Insider threats can pose significant risks to an organization’s data as emphasized by a report that has recently been released by the Institute for Critical Infrastructure Technology. The report highlights that a majority of cybersecurity incidents stem…
  • "Researchers Reverse 320 Million Hashed Passwords"
    Researchers have reversed the hashes of 320 million hashed passwords revealed by an online service, “Pwned Passwords”, created by security researcher, Troy Hunt, which allows users to search through a database of breached passwords in hopes of preventing…