top of page

Blog
Search


ZuoRAT: The New Spyware That's Infiltrating Home-Office Routers
As working from home has become the norm for many people worldwide, hacks have taken notice. A new cutting-edge "remote access trojan...
Michael Paulyn
Jul 13, 20221 min read


What Is Shadow IT, And Why Is It So Risky?
Shadow IT is the process by which users work to use unauthorized technology resources to skirt around their IT department firewalls and...
Michael Paulyn
Jul 9, 20221 min read


The US Could Be Breaking Up with TikTok Thanks to the FCC Commissioner
Recently, it's come out that the US Federal Communications Commission (FCC) has revived the idea of requesting that the Apple and Google...
Michael Paulyn
Jul 6, 20221 min read


Google's Latest AI Chatbot Project Might Be Alive, Says Engineer
An engineer working for Google recently stated that the company's latest AI chatbot project might be alive. Blake Lemoine interviewed...
Michael Paulyn
Jul 2, 20221 min read


Everything Any Businessperson Needs to Know About Vulnerability Assessment Reports: Part 2
When some businesspeople hear the term "vulnerability assessment report," their immediate thought is, "Oh gosh, not something else," and...
Michael Paulyn
Jun 30, 20221 min read


Staying Secure: 3 Easy Tips on Cyber-Hygiene
There's a second pandemic no one's talking about at all. Besides COVID-19, a cyber pandemic shows no signs of slowing down or going away....
Michael Paulyn
Jun 26, 20221 min read


Top 3 Best Cybersecurity Bootcamps of 2022
Undoubtedly, cybersecurity will play an even more integral role as we move into the future. That said, businesses everywhere need...
Michael Paulyn
Jun 22, 20222 min read


Major DDoS Attack Reaching 15 Million Per Sec Abruptly Halted by Cloudflare
As of April 2022, Cloudflare announced they abruptly halted a deadly DDoS, a distributed denial of service, attack reaching 15.3 million...
Michael Paulyn
Jun 19, 20221 min read


As Russia Continues Its Unprovoked War on Ukraine, Chinese Hackers Quietly Begin Targeting Russia
As of April 2022, Chinese cybersecurity forces have been quietly and consistently attacking Russian military personnel using an advanced...
Michael Paulyn
Jun 16, 20222 min read


A Few MIT Researchers found a Fatal Flaw in Apple's M1 CPUs and it's Unfixable
For the last decade, Apple has become known for being the crème de la crème when it comes to computer devices. Their ability to set high...
Michael Paulyn
Jun 12, 20222 min read


What Elon Musk's End-to-End Encryption for Twitter Could Mean for the Future
Unless you've been hiding under a rock, news about Elon Musk buying Twitter has been all the rage about town. Musk spoke of adding...
Michael Paulyn
Jun 9, 20222 min read


Everything Any Businessperson Needs to Know About Vulnerability Assessment Reports: Part 1
When some businesspeople hear the term "vulnerability assessment report," their immediate thought is, "oh gosh, not something else," and...
Michael Paulyn
Jun 5, 20222 min read


There's A New Tool Out to Scan Open-Source Repositories for Malicious Packages
The Open-Source Security Foundation (OpenSSF) announced that the first-generation prototype of a brand-new cutting-edge tool was...
Michael Paulyn
Jun 2, 20221 min read


In The News: Goldman Sachs $125 Billion Bet on Fighting Cyberattacks
In the last twelve months, dozens of companies are beginning to invest serious money into cybersecurity, and the realization is beginning...
Michael Paulyn
May 29, 20221 min read


Hacker Types 101: Black Hat vs. White Hat vs. Grey Hat Hackers
When most people hear "hacking," their minds instantly go to some data breach or complete network cyberattack. But there are good hackers...
Michael Paulyn
May 26, 20223 min read


A History Timeline of Russian Cyberattacks: 2007-2016
It's been about three months since the war in Ukraine began, but this isn't something new for Putin and his cronies. This blog looks at...
Michael Paulyn
May 22, 20223 min read


Cybersecurity News: Russia's Darknet Marketplace, Hydra, Responsible for Shutting Off German Servers
April 2022, German authorities announced that they shut down several servers in its infrastructure due to attacks from the Russian...
Michael Paulyn
May 19, 20221 min read


Remote Work and Its Possible Issues: Part 2
The sudden shift towards remote work shows no signs of dying down. The pandemic gave an enormous opportunity for cybercriminals...
Michael Paulyn
May 15, 20222 min read


North Korea's Lazarus Group Makes Off with Over $540 Million from Online Crypto Game Axie Infinity
The United States Treasury Department recently announced that the North Korean cyber group Lazarus Group, which goes by Hidden Cobra,...
Michael Paulyn
May 12, 20221 min read


Remote Work and Its Possible Issues: Part 1
The sudden shift towards remote work shows no signs of dying down. The pandemic gave an enormous opportunity for cybercriminals...
Michael Paulyn
May 8, 20221 min read
bottom of page