Tag: Cyber Security

  • Bear in the Cyber Den

    Bear in the Cyber Den

    RUSSIA’S FANCY BEAR STRIKES AGAIN, AND WHY THIS IS JUST THE BEGINNING In recent months, the cyber threat landscape has been dominated by headlines in the cyber world, talking about a Fancy Bear. You might be asking yourself, “Who is this bear? What makes the bear fancy? Why is there a bear working with computers?”… Read more

  • The Chinese Communist Party’s Little Red Notebook

    The Chinese Communist Party’s Little Red Notebook

    RedNote, known as Xiaohongshu, by its native Chinese consumers has experienced a surprising rise in popularity within the past few days in the United States. As an app that originally catered to Chinese shoppers looking for overseas products, it has since transformed into a complex social commerce platform that blends several elements of social media… Read more

  • Let’s Talk About Spyware and Pegasus Sextortion Scams

    Let’s Talk About Spyware and Pegasus Sextortion Scams

    Before we dive into the sextortion scam that has been the spotlight of discussion since September, let’s cover what spyware and its related symptoms are. Spyware is a malicious software that infiltrates user devices without consent and secretly collects information. There are various types of spyware including Adware, Keyloggers, Trojan Horse Viruses, Rootkits and more.… Read more

  • Cyberattacks and Mobile Devices

    Cyberattacks and Mobile Devices

    There are over 17 billion smartphones in the world today, and that number grows by the day. Thanks to technological progress, there is hardly anyone these days who doesn’t have one mobile phone or an Internet of Things (IoT) device. This is provided by the growing connectivity, but these devices are subject to various security… Read more

  • The Buzz Around Honeypots  

    In today’s ever evolving world of cyber threats, attackers are constantly adapting their strategy to evade detection, making the job of cybersecurity professionals a constant challenge. Each new defensive measure is met with new tactics aimed at finding a way around it. As the Irish Republican Army once remarked after a failed bombing attempt, “Today… Read more

  • Cyber Threats and the U.S. Election

    Cyber Threats and the U.S. Election

    As the presidential race is ending, cybercrime revolving around the election is at an all-time high. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) released a joint public service announcement (PSA) cautioning the widespread disinformation being spread by threat actors ahead of the U.S. general election. The announcement focused… Read more

  • Deepfake Frights: Unmasking the Shadows of Digital Deception

    Deepfake Frights: Unmasking the Shadows of Digital Deception

    October. The month the night grows longer, and spooky whispers fill the air. Your neighbor is masquerading as a world-renowned singer and her husband is living out his football superstar fantasies. October is a spectacle, and maybe it’s time to slip into your costume. Unfortunately, you are not the only one in disguise. In fact,… Read more

  • Forti-What Now? Breaches And How They Effect You 

    Forti-What Now? Breaches And How They Effect You 

    Recently, there has been a new wave of cyber-attacks that have caused quite a stir. From sextortion scams to social security breaches, there has been an insurmountable amount of new cybersecurity threats emerging every single day. Such activity can be very disheartening to those paying attention and can rear its ugly head in more ways… Read more

  • Predator Spyware: The Silent Stalker in The Digital Jungle

    Predator Spyware: The Silent Stalker in The Digital Jungle

    What is Predator? Could you imagine your phone, the device on which you keep all your sensitive data, have private conversations, and always keep on your person, has betrayed you? No clicks, weird downloads, not even an alert, and no mistakes on your part. Behind the scenes, a sneaky piece of software called spyware lurks… Read more

  • Cybersecurity and Artificial Intelligence Regulation

    Cybersecurity and Artificial Intelligence Regulation

    Cybersecurity regulation has evolved over the years. This has become the norm as technology is constantly advancing and being used in new and scary ways. Similar to how the Health Insurance Portability and Accountability Act, otherwise known as HIPPA, tells administrators who can view patient information and how that information must be protected digitally, cybersecurity… Read more