Latest News

Stay up to date with the latest posts and updates

Alerts

  • The Road Map to Illinois Being a Centralizing Force in Cyber Security

    The Road Map to Illinois Being a Centralizing Force in Cyber Security

    Illinois is known as the transportation hub of the United States, utilizing Chicago and its geographical center in America.  In 2019, The State of Illinois did a major…

    Continue Reading

    4 min read

  • Session Hijacking

    Session Hijacking

    There are many different types of session hijacking, including session fixation, man-in-the-middle attacks, and active session hijacking. In active session hijacking, an attacker takes over a live session…

    Continue Reading

    4 min read

  • When AI Imitates the Voice of Someone You Trust

    When AI Imitates the Voice of Someone You Trust

    Imagine getting a call from someone who sounds exactly like your wife, boss, or grandson. They are in trouble and need your help. But here’s the trick: it’s…

    Continue Reading

    4 min read

  • Caller ID Spoofing

    Caller ID Spoofing

    There are many different types of spoofing, from email spoofing to caller spoofing. The purpose behind spoofing is to deceive a system or person by impersonating a trusted…

    Continue Reading

    4 min read

  • Vulnerability Summary for the Week of August 11, 2025

    High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000 Projects–Sales Management System A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability…

    Continue Reading

    4 min read

  • CISA Releases Thirty-Two Industrial Control Systems Advisories

    CISA released thirty-two Industrial Control Systems (ICS) advisories on August 14, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-25-226-01 Siemens SIMATIC…

    Continue Reading

    4 min read