Author Archives: ThreatWarrior

Breach Blog: NASA’s Jet Propulsion Laboratory (JPL)

In 2018, NASA’s Jet Propulsion Lab (JPL) — a federally-funded research and development center that manages multiple deep space missions for NASA — was breached by hackers using a cheap, build-it-yourself Raspberry Pi computer. But that’s just the tip of… Read the full article…

Continue Reading

Breach Blog: The Texas Ransomware Attack

Prep your systems, local governments. 2019 is the year of government-targeted ransomware. At least 22 Texas towns were recently hit by a malicious, coordinated ransomware attack – the first of its kind to hit the public sector. It’s unclear at… Read the full article…

Continue Reading

Small Business, Big Target: Does My SMB Need Cybersecurity?

Small and midsized business owners are obviously aware of the threat of cyber attacks. You read about them in newspapers or hear about them on news reports. Everyone knows about the attacks on big companies including Yahoo, eBay, Equifax, Target… Read the full article…

Continue Reading

Different Cybersecurity Frameworks

There are numerous challenges to building and managing an information security program. Organizations need to comply with industry regulations, state directives and even international statutes in some cases. Frameworks offer a way to address your cyber defense. They help organizations… Read the full article…

Continue Reading

Zero-Day Attacks Explained

Zero-day attacks… an almost-menacing, militant-sounding term. Zero-day attacks (or zero-day exploits) are actually cyberattacks that take advantage of previously-unknown vulnerabilities in software. Zero-days are called so because the vulnerabilities are exploited before a patch is available, leaving developers zero days… Read the full article…

Continue Reading

Insider Threats

The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it… Read the full article…

Continue Reading

Cybersecurity and Our Critical Infrastructure

The nation’s infrastructure is vulnerable to cyberattacks. We know this because a successful, prolonged (the attacks began as early as March 2016) cyberattack was discovered this year. In March 2018, the United States Department of Homeland Security (DHS) and the… Read the full article…

Continue Reading

National Cybersecurity Awareness Month

If you own an internet-connected device and like to surf the web, awareness of how you can protect yourself from cyber attacks should already be a paramount issue. However, if you have not been the victim of a hack or… Read the full article…

Continue Reading

Phishing Explained: Don’t Get Hooked

If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know…. Read the full article…

Continue Reading
By Using the site you agree with our use of cookies. See our PRIVACY POLICY for more details. I Understand
Cybersecurity down for