
Don’t Let Hackers Win: How to Keep Your Applications Secure
Application security is a critical component of any company’s cybersecurity strategy. It is the process of identifying, identifying, and mitigating risks and vulnerabilities in software
Don’t be a Risky Business -Why Vendor Risk Assessments are Important
The What: Vendor risk assessments are an important part of managing the security and compliance of a company’s information technology systems. These assessments help organizations

CyberSecurity Issues–in SPACE?!
Cyber Threats in Space: The New Challenges Ahead In the last few years, a new space race has been booming among government agencies. Now private

Mastodon Bug Found
If you haven’t heard of Mastodon, it is a decentralized social media platform that users are flocking to to replace Twitter. After Elon Musk purchased

Google Pixel – Lock Screen Hack
Security Researcher, David Schütz, found a way to bypass the Google Pixel lock screen. The researcher was able to use their own sim card to

Azov Ransomware
Azov ransomware was originally thought to be yet another ransomware that encrypts a victim’s data, demands a ransom, and forces you to pay if you

What is a Honeypot?
The ever-expanding world of technology is growing bigger every day. With that comes a myriad of vulnerable and insecure computer systems that have been neglected.

New iPhone Feature – Lockdown Mode for Security
Here’s what Lockdown Mode on your iPhone does:
Message Attachments are blocked, except for images.
If a website has a complex tech, like just-in-time (JIT) Javascript compilation, it will be disabled.
FaceTime calls, and other incoming invitations and service requests, from unknown callers are blocked.
Uber Hack – Cybersecurity Threat
Uber got hacked! Learn more about this cybersecurity issue and what it means for your business.