Latest News
Stay up to date with the latest posts and updates
Alerts
-
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks.…
4 min read
-
The Road Map to Illinois Being a Centralizing Force in Cyber Security
Illinois is known as the transportation hub of the United States, utilizing Chicago and its geographical center in America. In 2019, The State of Illinois did a major…
4 min read
-
Session Hijacking
There are many different types of session hijacking, including session fixation, man-in-the-middle attacks, and active session hijacking. In active session hijacking, an attacker takes over a live session…
4 min read
-
When AI Imitates the Voice of Someone You Trust
Imagine getting a call from someone who sounds exactly like your wife, boss, or grandson. They are in trouble and need your help. But here’s the trick: it’s…
4 min read
-
Caller ID Spoofing
There are many different types of spoofing, from email spoofing to caller spoofing. The purpose behind spoofing is to deceive a system or person by impersonating a trusted…
4 min read
-
Vulnerability Summary for the Week of August 11, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Sales Management System A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability…
4 min read





