BLOG

Exploring Malicious Hacker Communities: Predicting Imminent Cyber Threats

Cyber attacks don't come out of nowhere - although people still believe this chaotic scenario...

Colonial Pipeline Breach Part 2: Three Important Observations

The Colonial Pipeline breach brought the physical-world effects of a cyber-attack – such as...

Colonial Pipeline Breach: Vulnerabilities Used by DarkSide

This is the first in a 2-part series on the Colonial Pipeline breach.  In today’s blog and...

New Russian Attacks: CYR3CON Analysis on Five Vulnerabilities Reportedly Used by the SVR

On Thursday, the NSA reported that Russian intelligence is exploiting 5 particular...

Accellion FTA Zero-Day Vulnerabilities and Recent Data Theft & Extortion Attacks

For several weeks, organizations around the world have reported data breaches relating to...

Q&A: The Oldsmar Cyber Attack

{% video_player "embed_player" overrideable=False, type='scriptV4', hide_playlist=True,...

The Vulnerabilities FireEye Hackers will Start to Use

Earlier in the week, it was reported that FireEye was breached – likely by Russian hackers.  The...

COVID-19 Part 3 - Web Application Vulnerabilities

 

With state government stay-at-home orders pushing more people online, bad actors are...

Video blog: The Basics on Vulnerability Prioritization

 

Today’s video discusses the basics on vulnerability prioritization.  In it we discuss how...