
Basic Cyber Hygiene, Part 1
Humans are the weakest link in security, and this saying is often repeated for good reason. The majority of cybersecurity incidents are the result of human error on some level.
HAFNIUM, ProxyLogon, and DearCry
We explained what zero-day vulnerabilities and zero-day attacks are in a previous article. New examples were provided early this month. On March 2, Tom Burt, Corporate Vice President of Customer
Zero-Day Vulnerabilities and Zero-Day Attacks
Every now and then, a zero-day attack will make headlines in the world of cybersecurity. Zero-day attacks exploit zero-day vulnerabilities. According to Ryan Naraine of ZDNet, the Stuxnet worm—discovered in
Ransomware Trends from Late 2020 to Early 2021
Controversy surrounded CD Projekt Red, a Polish videogame company, when their release of Cyberpunk 2077 was met with negative reception due to excessive glitches in console versions of the game.
Side-Channel Attacks and Hardware Vulnerabilities
Last month, a new attack method that can work against Intel CPUs was publicized: PLATYPUS. This new attack method—discovered by Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon,
Online Voting and Cybersecurity
The COVID-19 pandemic is a significant obstacle to participation in U.S. elections, especially the upcoming general election. Online voting could potentially minimize the spread of the coronavirus and allow citizens
Computer Viruses and the Coronavirus
As organizations in the private, financial, and government sectors take drastic steps to combat the spread of COVID-19, cybercriminals are taking advantage of the chaos. Recently, both the World Health