Subscribe

Colonial Pipeline Recovers Ransomware Payment


Posted June 7, 2021 in Ransomware, Data Breach, Malware

The DOJ recovered a significant portion of Colonial Pipeline's $4.4M ransom payment. See how authorities tracked the...

Malicious USB Cables: Hidden Cybersecurity Threat


Posted June 3, 2021 in Malware, Data Breach, Penetration Testing

Hackers now embed attack tools inside ordinary-looking USB cables. Learn why you should never borrow a charging cord...

Colonial Pipeline Pays $5M Ransom: What Went Wrong


Posted May 14, 2021 in Ransomware, Data Breach, Malware

Colonial Pipeline paid $5 million to hackers who crippled US fuel supplies. Learn how the attack succeeded and what...

Biden Signs Cybersecurity Executive Order


Posted May 13, 2021 in Data Breach, Compliance, Malware

The White House executive order mandates sweeping federal cybersecurity improvements. Discover what the new...

Colonial Pipeline Cyberattack Shuts Operations


Posted May 8, 2021 in Data Breach, Cloud Security, Malware

A ransomware attack forced Colonial Pipeline to shut down 5,500 miles of fuel infrastructure. Learn how the attack...

Facebook Data Leak: How to Protect Your Information


Posted April 5, 2021 in Data Breach, Malware, Cloud Security

Over 500 million Facebook users' personal data was posted in a hacking forum. Check if you are affected and take...

New Year Tech Tips to Start the Year Secure

New Year Tech Tips to Start the Year Secure


Posted March 6, 2021 in Malware, AI, Data Breach

The holidays are the perfect time to upgrade your family's tech habits. Get practical cybersecurity tips to protect...

CES Tech Trends: What to Expect This Year

CES Tech Trends: What to Expect This Year


Posted March 6, 2021 in AI, Cloud Security, Data Breach

CES showcases the technology shaping our future, from AI to smart devices. Explore the top innovations and trends you...