Lucas Casimir appropriated my bank account! I don't know him. I don't know if this is his real name, or even if he is a male. But whomever he/she is, I'll never forget the name of Cybercriminal Lucas …
Cyber-MAD and WWIII
The proliferation of Stuxnet adds a new threat to the world stage. During the cold war, the Governments of East vs. West kept each other …
Anatomy of a Cyberattack
A cyberattack is any attempt to expose, alter, disable, destroy, steal or gain unauthorized access to or make unauthorized use of an asset by hacking into a susceptible system. Cyberattacks are …
The Role of Malicious Code in Cyberattacks
Malicious code refers to viruses, Trojan horses, worms, logic bombs, and any other software created for the purpose of attacking a platform. Virus: A code segment that replicates by …
Continue Reading about The Role of Malicious Code in Cyberattacks →
Top 4 Cybersecurity Threats and Vulnerabilities
A vulnerability is a weakness in a system, system security procedure, internal controls, or implementation that could be exploited by a threat source. Vulnerabilities leave systems susceptible to a …
Continue Reading about Top 4 Cybersecurity Threats and Vulnerabilities →
The Cybersecurity Ecosystem
Data breaches occur virtually on a daily basis. Cybercriminals are making enormous sums of money by selling breached data, information, or intellectual property on the dark web or in the gray or black …