Cyber Daily

Tested to Work, Not Tested to Secure: Why Critical Crypto Bugs Hide for Years

Tested to Work, Not Tested to Secure: Why Critical Crypto Bugs Hide for Years

Heartbleed (CVE-2014-0160) lurked in OpenSSL for two years. These simple missing bounds check exposed private keys across hundreds of thousands...
Read More
Machine Learning in Threat Detection: What Actually Works

Machine Learning in Threat Detection: What Actually Works

December 2020. FireEye discovers they've been breached.The attackers had been inside for months. They used legitimate credentials. No malware signatures....
Read More
CMMC Isn’t Just for the DoD: The Ripple Effect Across All Industries

CMMC Isn’t Just for the DoD: The Ripple Effect Across All Industries

When most leaders hear “CMMC,” their minds immediately jump to the Department of War.  This is understandable since the Cybersecurity...
Read More
AI in Cybersecurity: A Game Changer or a New Threat?

AI in Cybersecurity: A Game Changer or a New Threat?

Artificial Intelligence has been sprouting up in every direction in recent times—from assisting you in writing emails quickly to making...
Read More
Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity is undergoing an unprecedented transformation. AI's growing adaptability now enables autonomous, evasive attacks. Simultaneously, quantum computers draw ever closer,...
Read More

{Latest Posts}

hand holding cloud connected to apps, raining information, cybersecurity services

Cybersecurity Services

There are a lot of common issues that plague your digital devices. Traversing the internet is no simple task in 2018. For example, one in thirteen web requests lead to malware. It is incredible likely

Read More »
Cords plugging into a system firewall

What is a Firewall and How Does it Work?

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules

Read More »
honeypot sitting on a brown paper on a table. Spoon in honey. Honey jar.

What is a Honeypot?

In 1986, systems administrator Clifford Stoll noticed nine seconds of unpaid computer time at the Lawrence Berkeley National Laboratory. Upon being asked to resolve this, Stoll eventually came to the conclusion that a hacker had illegally gained

Read More »
Malware fishing hook grabbing password out of envelope.

8 Different Types of Malware

To combat malware, it’s important that you get your malware classifications right. These are the different types of malware and explaining how to recognize them: 1. Virus We tend to refer to all malware as

Read More »