Blog

Partnership Brings Predictive Threat Intelligence to GRF Members

Jaquar Harris on Aug 6, 2020 10:30:00 AM

Patch What Matters: Strategic Partnership Brings Predictive Threat Intelligence to GRF Member Organizations 

LibreHealth Open Source Software Flaws

Paulo Shakarian on Jul 23, 2020 8:00:39 AM

Last week, on July 14, 2020, security researchers at BishopFox Labs (BFL) disclosed new vulnerabilities in the electronic health record (EHR) system LibreHealth EHR 2.0 that they had discovered in..

Cozy Bear Conducting COVID-19 “Research”

Geoff Stoker on Jul 20, 2020 7:49:09 AM

 

 

The Russian hacker group Cozy Bear or APT29 (aka the Dukes, Office Monkeys, CozyCar) is targeting organizations involved in COVID-19 vaccine research according to key government cyber..

WAFs and Ignored Threats

Paulo Shakarian on Jul 13, 2020 11:37:11 AM

 

There is growing, general dissatisfaction with Web Application Firewalls (WAFs) as highlighted in a recent study by Neustar and subsequent article by DarkReading.

Identify and Mitigate Systemic Cyber Threat

Paulo Shakarian on Jun 1, 2020 6:11:29 AM

 

For CISO’s responsible for a portfolio of companies – whether at a private equity firm, holding company, or even just a large firm with multiple business units, understanding cyber threats that..

Interview with Ed Amoroso of TAG Cyber

Paulo Shakarian on May 18, 2020 8:03:41 AM

 

Last year, I had the good fortune to sit down and talk with Ed Amoroso, CEO of TAG Cyber, a top-notch cybersecurity research firm. 

ML for Cybersecurity

Paulo Shakarian on May 13, 2020 9:19:28 AM

 

Ever since we started CYR3CON, we are continually surprised at the hype cycle surrounding the application of machine learning.

COVID-19 Part 4 – Virus-Inspired Novelty

Geoff Stoker on May 11, 2020 7:51:02 AM

 

The novel coronavirus SARS-CoV-2 (COVID-19) has sparked creativity in many people, like the folks in Spain associated with the OxyGEN project who rapidly prototyped an automatic ventilator using..

COVID-19 Part 3 - Web Application Vulnerabilities

Geoff Stoker on May 4, 2020 7:17:09 AM

 

With state government stay-at-home orders pushing more people online, bad actors are increasingly interested in and increasing their use of web shell malware.

Video blog: The Basics on Vulnerability Prioritization

Paulo Shakarian on Apr 27, 2020 5:30:40 AM

 

Today’s video discusses the basics on vulnerability prioritization.  In it we discuss how mounting vulnerability disclosures – which averaged over 1,000 per month last year lead to a difficult..

Contact Us

Tempe, AZ 85280

Email: sales@cyr3con.ai
Phone: (833) 229-0110

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.