Latest News
Stay up to date with the latest posts and updates
Alerts
-
Vulnerability Summary for the Week of August 25, 2025
High Vulnerabilities PrimaryVendor — Product Description Published CVSS Score Source Info 1000projects–Online Project Report Submission and Evaluation System A vulnerability has been found in 1000projects Online Project Report…
4 min read
-
CISA Shares Lessons Learned from an Incident Response Engagement
Advisory at a Glance Executive Summary CISA began incident response efforts at a U.S. federal civilian executive branch (FCEB) agency following the detection of potential malicious activity identified…
4 min read
-
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
Executive summary People’s Republic of China (PRC) state-sponsored cyber threat actors are targeting networks globally, including, but not limited to, telecommunications, government, transportation, lodging, and military infrastructure networks.…
4 min read
-
The Road Map to Illinois Being a Centralizing Force in Cyber Security
Illinois is known as the transportation hub of the United States, utilizing Chicago and its geographical center in America. In 2019, The State of Illinois did a major…
4 min read
-
Session Hijacking
There are many different types of session hijacking, including session fixation, man-in-the-middle attacks, and active session hijacking. In active session hijacking, an attacker takes over a live session…
4 min read
-
When AI Imitates the Voice of Someone You Trust
Imagine getting a call from someone who sounds exactly like your wife, boss, or grandson. They are in trouble and need your help. But here’s the trick: it’s…
4 min read




