Latest News
Stay up to date with the latest posts and updates
Alerts
-
The Road Map to Illinois Being a Centralizing Force in Cyber Security
Illinois is known as the transportation hub of the United States, utilizing Chicago and its geographical center in America. In 2019, The State of Illinois did a major…
4 min read
-
Session Hijacking
There are many different types of session hijacking, including session fixation, man-in-the-middle attacks, and active session hijacking. In active session hijacking, an attacker takes over a live session…
4 min read
-
When AI Imitates the Voice of Someone You Trust
Imagine getting a call from someone who sounds exactly like your wife, boss, or grandson. They are in trouble and need your help. But here’s the trick: it’s…
4 min read
-
Caller ID Spoofing
There are many different types of spoofing, from email spoofing to caller spoofing. The purpose behind spoofing is to deceive a system or person by impersonating a trusted…
4 min read
-
Vulnerability Summary for the Week of August 11, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Sales Management System A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability…
4 min read
-
CISA Releases Thirty-Two Industrial Control Systems Advisories
CISA released thirty-two Industrial Control Systems (ICS) advisories on August 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-226-01 Siemens SIMATIC…
4 min read





