Back to Main Navigation

PREDICT EXPLOITS

REDUCE COSTS

PREDICTION FOR THE CLOUD

ADVANCED CAPABILITIES

Back to Main Navigation

Resources

Predictive Threat Assessment Sign Up

Watch Now

PR1ORITY Product Demo
Back to Main Navigation

About CYR3CON

Come Join Us

CYR3CON is always looking for top talent to join our team.
View Openings
Back to Main Navigation

Take the next step to be in the know, now.

Complete the form and a member of the CYR3CON team will contact you shortly to discuss your cyber security needs.

Contact Form

Blog

COVID-19 Part 3 - Web Application Vulnerabilities

Geoff Stoker on May 4, 2020 7:17:09 AM

 

With state government stay-at-home orders pushing more people online, bad actors are increasingly interested in and increasing their use of web shell malware.

Video blog: The Basics on Vulnerability Prioritization

Paulo Shakarian on Apr 27, 2020 5:30:40 AM

 

Today’s video discusses the basics on vulnerability prioritization.  In it we discuss how mounting vulnerability disclosures – which averaged over 1,000 per month last year lead to a difficult..

COVID-19 Part 2 - VPN Risks

Geoff Stoker on Apr 13, 2020 9:36:55 AM

 

COVID-19 Cybersecurity Concerns Part 1

Geoff Stoker on Apr 8, 2020 9:50:04 AM

 

WannaCry about Equifax? What about the Culprits?

Geoff Stoker on May 30, 2019 11:56:36 AM

 

Equifax recently (10 May) released first quarter financial results. In addition to the normal information about revenue and EPS, was this tidbit:

Since the announcement of the cybersecurity..

Three Key Lessons from the Binance Hack

Paulo Shakarian on May 21, 2019 8:54:12 AM

 

Cybersecurity Risk & Fundamentals

Geoff Stoker on Feb 11, 2019 6:05:00 AM

 

On September 7, 2017, Equifax announced it had suffered a cybersecurity incident resulting in the download of millions of consumers’ personal information from mid-May through late July. Last..

Hope and Hype for Cybersecurity AI

Geoff Stoker on Feb 6, 2019 6:36:00 AM

 

Modern Artificial Intelligence (AI) research began soon after the end of WW II perhaps best indicated by Alan Turing’s 1950 question, “Can machines think?” Since then, while devoted researchers..

Major Vendors Dismissed Top Vulnerability for Malware Delivery

Paulo Shakarian on Feb 4, 2019 6:02:00 AM

Recent reporting by Cisco on information stealing malware  designed to hide from most anti-virus solutions  is leveraging Microsoft Office vulnerability CVE-2017–11882.

Does..

Current Threats: Fileless Malware

Paulo Shakarian on Nov 5, 2018 6:30:10 PM

 

Fileless malware is on the rise and is enabling many attacks in 2018. While fileless techniques were prevalent in 2017, most of the more well-known attacks still accessed the disk and..