top of page

Blog
Search


Using a New Linux Malware Framework, Attackers Can Secretly Install Rootkits
A never-before-seen Linux malware virus that can set up rootkits and has a modular approach has received the nickname "Swiss Army Knife."...
Michael Paulyn
Oct 22, 20232 min read


Quick Snapshot: What is Python?
Python has taken the tech world as one of the most popular coding languages. With a range of versatility that extends from machine...
Michael Paulyn
Oct 20, 20231 min read


In The News: Meta Was Restricting Abortion Content
As luck would have it, Meta is now again in hot water, not for another metaverse idea but for actively restricting content on abortion....
Michael Paulyn
Oct 13, 20231 min read


In The News: As It Turns Out, China's Been Hacking US Phone Networks
China has been secretly hacking the United States' phone networks for years without anyone being the wiser. Over the last two years,...
Michael Paulyn
Oct 7, 20231 min read


Hot Off the Press: Update Your Windows OS and Chrome Browser
This past June saw a ton of software updates across many platforms, many of which fixed some major weak points and vulnerabilities. It...
Michael Paulyn
Oct 4, 20231 min read


Quick Snapshot on Ransomware's Elements
Ransomware is a type of malware that cybercriminals use to prevent users from having access to their network, system, or data. Hackers...
Michael Paulyn
Sep 30, 20231 min read


In The News: Experts Ringing the Alarm Against New Threat of "Black Basta" Ransomware
Listen up if you're in the United States, Canada, Australia, New Zealand, or the United Kingdom. Cybersecurity experts are ringing the...
Michael Paulyn
Sep 27, 20231 min read


ZuoRAT: The New Spyware That's Infiltrating Home-Office Routers
As working from home has become the norm for many people worldwide, hacks have taken notice. A new cutting-edge "remote access trojan...
Michael Paulyn
Sep 23, 20231 min read


What Is Shadow IT, And Why Is It So Risky?
Shadow IT is the process by which users work to use unauthorized technology resources to skirt around their IT department firewalls and...
Michael Paulyn
Sep 20, 20231 min read


The US Could Be Breaking Up with TikTok Thanks to the FCC Commissioner
Recently, it's come out that the US Federal Communications Commission (FCC) has revived the idea of requesting that the Apple and Google...
Michael Paulyn
Sep 16, 20231 min read


Google's Latest AI Chatbot Project Might Be Alive, Says Engineer
An engineer working for Google recently stated that the company's latest AI chatbot project might be alive. Blake Lemoine interviewed...
Michael Paulyn
Sep 13, 20231 min read


Everything Any Businessperson Needs to Know About Vulnerability Assessment Reports: Part 2
When some businesspeople hear the term "vulnerability assessment report," their immediate thought is, "Oh gosh, not something else," and...
Michael Paulyn
Sep 9, 20231 min read


Staying Secure: 3 Easy Tips on Cyber-Hygiene
There's a second pandemic no one's talking about at all. Besides COVID-19, a cyber pandemic shows no signs of slowing down or going away....
Michael Paulyn
Sep 6, 20231 min read


Top 3 Best Cybersecurity Bootcamps of 2023
Undoubtedly, cybersecurity will play an even more integral role as we move into the future. That said, businesses everywhere need...
Michael Paulyn
Sep 2, 20232 min read


Major DDoS Attack Reaching 15 Million Per Sec Abruptly Halted by Cloudflare
As of April 2022, Cloudflare announced they abruptly halted a deadly DDoS, a distributed denial of service, attack reaching 15.3 million...
Michael Paulyn
Aug 30, 20231 min read


As Russia Continues Its Unprovoked War on Ukraine, Chinese Hackers Begin Targeting Russia
As of April 2022, Chinese cybersecurity forces have been quietly and consistently attacking Russian military personnel using an advanced...
Michael Paulyn
Aug 26, 20232 min read


A Few MIT Researchers found a Fatal Flaw in Apple's M1 CPUs and it's Unfixable
For the last decade, Apple has become known for being the crème de la crème when it comes to computer devices. Their ability to set high...
Michael Paulyn
Aug 23, 20232 min read


What Elon Musk's End-to-End Encryption for Twitter Could Mean for the Future
Unless you've been hiding under a rock, news about Elon Musk buying Twitter has been all the rage about town. Musk spoke of adding...
Michael Paulyn
Aug 19, 20232 min read


Everything Any Businessperson Needs to Know About Vulnerability Assessment Reports: Part 1
When some businesspeople hear the term "vulnerability assessment report," their immediate thought is, "Oh gosh, not something else," and...
Michael Paulyn
Aug 16, 20232 min read


There's A New Tool Out to Scan Open-Source Repositories for Malicious Packages
The Open-Source Security Foundation (OpenSSF) announced that the first-generation prototype of a brand-new cutting-edge tool was...
Michael Paulyn
Aug 12, 20231 min read
bottom of page