Exploring Malicious Hacker Communities: Predicting Imminent Cyber Threats
Cyber attacks don't come out of nowhere - although people still believe this chaotic scenario rules...
Colonial Pipeline Breach Part 2: Three Important Observations
The Colonial Pipeline breach brought the physical-world effects of a cyber-attack – such as those...
Colonial Pipeline Breach: Vulnerabilities Used by DarkSide
This is the first in a 2-part series on the Colonial Pipeline breach. In today’s blog and video,...
New Russian Attacks: CYR3CON Analysis on Five Vulnerabilities Reportedly Used by the SVR
On Thursday, the NSA reported that Russian intelligence is exploiting 5 particular vulnerabilities...
Accellion FTA Zero-Day Vulnerabilities and Recent Data Theft & Extortion Attacks
For several weeks, organizations around the world have reported data breaches relating to zero-day...
Q&A: The Oldsmar Cyber Attack
{% video_player "embed_player" overrideable=False, type='scriptV4', hide_playlist=True,...The Vulnerabilities FireEye Hackers will Start to Use
Earlier in the week, it was reported that FireEye was breached – likely by Russian hackers. The...
COVID-19 Part 3 - Web Application Vulnerabilities
With state government stay-at-home orders pushing more people online, bad actors are increasingly...
Video blog: The Basics on Vulnerability Prioritization
Today’s video discusses the basics on vulnerability prioritization. In it we discuss how...