
Ransomware Trends from Late 2020 to Early 2021
Controversy surrounded CD Projekt Red, a Polish videogame company, when their release of Cyberpunk 2077 was met with negative reception due to excessive glitches in console versions of the game.
Passwords vs Passphrases
It is practically impossible to use the internet for work without creating at least one password. Unfortunately, people tend to choose passwords that are simple enough for bad actors to
COVID-19 Scams and 2021
Since last year, we have published several articles about COVID-19 and how cybercriminals exploit the pandemic. We expect that cybercriminals will continue to exploit the pandemic in 2021. They will
SUNBURST and Supply Chain Attacks
Recently, a global intrusion campaign has been making headlines. The campaign exploits SolarWinds Orion software, and roughly 18,000 of SolarWinds’ customers have been compromised. This article provides an overview of
Insider Threats and the Principle of Least Privilege
The majority of cybercriminals operate outside of the organizations they target, but some threats come from within the organizations themselves. The Department of Homeland Security defines an insider threat as
Side-Channel Attacks and Hardware Vulnerabilities
Last month, a new attack method that can work against Intel CPUs was publicized: PLATYPUS. This new attack method—discovered by Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon,
Homomorphic Encryption and Privacy
Encryption is used to protect everything sensitive, including website accounts, emails, video conferencing, health records, and all sorts of data transmitted over the internet. We touched on some of the
SD Solutions wins Corporate Social Responsibility Award from the Asian American Chamber of Commerce
During the ‘Jewels of Asia’ Chamber Awards Gala, SD Solutions officially accepted the Corporate Social Responsibility Award from the Asian American Chamber of Commerce. The CEO of SD Solutions, Balaji
Black Hats, Gray Hats, White Hats, and More
A previous blog article posted in August explained how a group of young hackers compromised over a hundred Twitter accounts. However, not all young hackers exploit systems for criminal purposes.