top of page

Blog
Search


My Journey to Working Remotely
Remote work seems to be sticking around; understanding how this new way of working can benefit oneself is a huge advantage. Below, I...
Michael Paulyn
Apr 21, 20233 min read


Remote Work Linked to Increased Cybersecurity Risks
Remote work has brought about a new dynamic regarding how we work. The changes the pandemic has brought forth have been profound and seem...
Michael Paulyn
Apr 19, 20232 min read


What is IoT? And How Does It Work?
There's been a lot of chatter about IoT, or the Internet of Things, with many people giving their two cents and discussing how it could...
Michael Paulyn
Apr 15, 20233 min read


What is 5G? And How Is It a Cybersecurity Threat?
Right now, there's a revolution happening in your homes. The digital world is changing as we know it, and it won't just affect the...
Michael Paulyn
Apr 12, 20232 min read


The Future of Cybersecurity: It Could Be Artificial Intelligence (AI)
Our world is going increasingly online, and as this happens, there needs to be a way to protect sensitive information. The future of...
Michael Paulyn
Apr 8, 20233 min read


The Rise of Automotive Hacking & 4 Ways to Stop It
The car industry seems to be heading for driverless vehicles and trucks; it's only time. Industry experts state these new autonomous cars...
Michael Paulyn
Apr 5, 20232 min read


Microsoft Gives New Warnings That Russian Hackers Now Using Stealthy Outlook Vulnerability
Recently, Microsoft shared warnings and tips on how customers can locate indicators of compromise (IoCs) associated with a recently...
Michael Paulyn
Apr 1, 20231 min read


In an Attempt to Catch Cybercriminals, UK National Crime Agency Creates Fake DDoS-For-Hire Sites
The UK National Crime Agency (NCA) announced it developed an intricate network of false DDoS-for-hire websites to penetrate the...
Michael Paulyn
Mar 29, 20231 min read


Devastating LastPass Data Breach Due to Engineer's Failure to Update Plex Software
In a recent devastating data breach on LastPass, it turns out the cause was one of the engineers not updating the Plex Software, a...
Michael Paulyn
Mar 26, 20231 min read


Using Zero-Day Flaw Cybercriminals Make off with Over $1.6 Million in Crypto Assets
General Bytes, the Bitcoin ATM maker, has recently announced that unidentified cybercriminals could make off with crypto assets by...
Michael Paulyn
Mar 22, 20231 min read


What is an API?
APIs, also known as Application Programming Interfaces, allow two different pieces of software to talk to one another with help from a...
Michael Paulyn
Mar 18, 20232 min read


The Future of the Cybersecurity Industry
The world is changing, and there are no signs of slowing down anytime soon. In the near future, cybersecurity will become a top priority...
Michael Paulyn
Mar 15, 20231 min read


Here are Several Predictions for the Cybersecurity Industry
Cybersecurity Ventures predicts that cybercrime damages will cost the world $10.5 trillion annually by 2025. The basis for this estimate...
Michael Paulyn
Mar 12, 20231 min read


The Difference Between Application Security and APIs
When it comes to application and API security, both look to address the importance to address both to have a comprehensive security...
Michael Paulyn
Mar 9, 20231 min read


Here are The Top Cybersecurity Terms You Should Know for 2023 Part 2
Here are the critical cybersecurity terms to know for 2023; the difference between knowing and not knowing can be the key to avoiding a...
Michael Paulyn
Mar 4, 20231 min read


Here are The Top Cybersecurity Terms You Should Know for 2023 Part 1
Here are the critical cybersecurity terms to know for 2023; the difference between knowing and not knowing can be the key to avoiding a...
Michael Paulyn
Mar 2, 20232 min read


Financially Inclined Hackers Using Innovative Ransomware and Clipper Malware
In a string of new financially motivated cyberattacks beginning at the end of 2022, hackers are now using an innovative ransomware strain...
Michael Paulyn
Feb 26, 20231 min read


North Korean Hacker Group APT37, using New M2RAT Malware to Attack the South
The North Korean-backed hacker group, APT37, is working on using some new malware known as M2RAT in hopes of attacking South Korea....
Michael Paulyn
Feb 22, 20231 min read


Here are the Top 3 Overlooked Cybersecurity Breaches of 2023
Cybercriminals don't sleep; with month two not even done for 2023, attacks are already rising, and companies need to be on the lookout....
Michael Paulyn
Feb 19, 20232 min read


Remote Work is Helping to Change the Cybersecurity Landscape Part 2
The remote work revolution has opened up many opportunities for many people worldwide in an array of industries. But with every new...
Michael Paulyn
Feb 16, 20232 min read
bottom of page