top of page


World-Class Cyber Services
Cyber Services Delivered with a CX
Search


Manual vs. Automated Penetration Testing: What You Need to Know
Both methods have their advantages and disadvantages, and choosing the right one depends on several factors.
Ben Card
Feb 12, 20245 min read
101 views
0 comments


Hacktivists Target Israeli Companies; Will We Be Next?
Group of Israeli info sec experts are joining forces to offer free cyber security services to Israeli businesses amid a surge in hacktivism.
Ben Card
Oct 16, 20233 min read
18 views
0 comments


Google Authenticator Made a Breach So Much Worse
A security company is calling out a feature in Google's Authenticator app that it says made a recent network breach much worse.
Ben Card
Sep 20, 20237 min read
36 views
0 comments


The Rise of AI-Empowered Cybercrime
Cyber criminals can use AI to streamline their operations, but you can use it effectively too.
Ben Card
Sep 11, 20234 min read
31 views
0 comments


Is AI Automation of Security Safe?
AI is increasingly being used in cybersecurity to protect against cyberattacks, but is it safe?
Ben Card
Sep 7, 20232 min read
17 views
0 comments


Security Risks of Using Free AI Tools
AI technologies can be valuable but also pose security risks. These risks include data breaches, privacy issues, and copyright infringement
Ben Card
Aug 28, 20232 min read
211 views
0 comments


US to Hit Record Number of Data Breaches
ITRC reported that the total number of data compromise events so far could make this year the worst on record.
Ben Card
Jul 17, 20232 min read
22 views
0 comments


Widespread Attacks by Rapidly Evolving Buhti Ransomware
A newly discovered ransomware group codenamed “Buhti” is making use of both LockBit and Babuk variations to target Linux and Windows systems
Ben Card
May 30, 20232 min read
21 views
0 comments


You Can Be Deepfaked Right Now and Lose Millions
The potential dangers of artificial intelligence (AI) has everyone abuzz.
Ben Card
Apr 20, 20232 min read
5 views
0 comments


CentOS CWP Exploitation Quickly Follows Its PoC
Exploitation attempts against a critical CentOS Control Web Panel vulnerability have been observed shortly following the proof of concept
Ben Card
Jan 17, 20232 min read
47 views
0 comments

Modern Vulnerability Management - Beyond the NIST Cybersecurity Framework
NIST compliance is far from enough to keep government agencies--and private organizations--safe.
Ben Card
Jan 9, 20233 min read
26 views
0 comments


Ransomware Attacks Increase During Holidays & Weekends--When Security Teams Are Least Prepared
The primary causes of costly security breaches—and longer investigation times—is a combination of insufficient SOC staffing and....
Ben Card
Nov 29, 20223 min read
25 views
0 comments


Security Awareness Training: A High-Value Program
Building a robust security awareness training program can help mitigate expensive risks poses by cybercrime.
Ben Card
Oct 27, 20224 min read
27 views
0 comments


3 Critical Sectors: Target of New White House Cyber Regulations
White House deputy national security adviser said that 3 infrastructure sectors will be the targets of more regulation around cyber security
Ben Card
Oct 24, 20222 min read
14 views
0 comments


Facebook Business Accounts Being Hijacked by Ducktail Malware
“Ducktail” information stealing malware has a new PHP-based variant has been spreading across the Internet via cracked installers
Ben Card
Oct 17, 20222 min read
15 views
0 comments


Homeland Security Legislators Introduce an Open Source Security Law
This critical legislation will, for the first time ever, codify open-source software as public infrastructure.
Ben Card
Sep 26, 20223 min read
3 views
0 comments

Attackers Scanning Within 15 Minutes of Zero-Day Disclosures
Threat actors now begin scanning for vulnerable systems within 15 minutes of disclosure of new Common Vulnerabilities and Exposures (CVEs).
Ben Card
Aug 15, 20223 min read
10 views
0 comments


H0lyGh0st Ransomware Campaign: Specifically Targeting SMBs
H0lyGh0st has been observed primarily targeting SMBs, including industries such as manufacturing, banking, education, and event planning...
Ben Card
Jul 19, 20222 min read
27 views
0 comments


FTC Adds Auto Dealerships to Safeguards Rule
The U.S. Federal Trade Commission (FTC)—a bipartisan federal agency that champions the interests of American consumers—has added certain...
Ben Card
Jul 14, 20223 min read
15 views
0 comments


Eternity Project: A Potent Threat
Toolset Is a Potent Threat. A dangerous new malware subscription service capable of a wide variety of attacks has been identified.
Ben Card
Jun 14, 20222 min read
40 views
0 comments
bottom of page