Latest News
Stay up to date with the latest posts and updates
Alerts
-
Session Hijacking
There are many different types of session hijacking, including session fixation, man-in-the-middle attacks, and active session hijacking. In active session hijacking, an attacker takes over a live session…
4 min read
-
When AI Imitates the Voice of Someone You Trust
Imagine getting a call from someone who sounds exactly like your wife, boss, or grandson. They are in trouble and need your help. But here’s the trick: it’s…
4 min read
-
Caller ID Spoofing
There are many different types of spoofing, from email spoofing to caller spoofing. The purpose behind spoofing is to deceive a system or person by impersonating a trusted…
4 min read
-
Vulnerability Summary for the Week of August 11, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Sales Management System A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability…
4 min read
-
CISA Releases Thirty-Two Industrial Control Systems Advisories
CISA released thirty-two Industrial Control Systems (ICS) advisories on August 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-226-01 Siemens SIMATIC…
4 min read
-
CISA and Partners Release Asset Inventory Guidance for Operational Technology Owners and Operators
CISA, along with the National Security Agency, the Federal Bureau of Investigation, Environmental Protection Agency, and several international partners, released comprehensive guidance to help operational technology (OT) owners…
4 min read



