Cyber Daily

Tested to Work, Not Tested to Secure: Why Critical Crypto Bugs Hide for Years

Tested to Work, Not Tested to Secure: Why Critical Crypto Bugs Hide for Years

Heartbleed (CVE-2014-0160) lurked in OpenSSL for two years. These simple missing bounds check exposed private keys across hundreds of thousands...
Read More
Machine Learning in Threat Detection: What Actually Works

Machine Learning in Threat Detection: What Actually Works

December 2020. FireEye discovers they've been breached.The attackers had been inside for months. They used legitimate credentials. No malware signatures....
Read More
CMMC Isn’t Just for the DoD: The Ripple Effect Across All Industries

CMMC Isn’t Just for the DoD: The Ripple Effect Across All Industries

When most leaders hear “CMMC,” their minds immediately jump to the Department of War.  This is understandable since the Cybersecurity...
Read More
AI in Cybersecurity: A Game Changer or a New Threat?

AI in Cybersecurity: A Game Changer or a New Threat?

Artificial Intelligence has been sprouting up in every direction in recent times—from assisting you in writing emails quickly to making...
Read More
Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity as a Pillar of National Security: A Fight for Our Future

Cybersecurity is undergoing an unprecedented transformation. AI's growing adaptability now enables autonomous, evasive attacks. Simultaneously, quantum computers draw ever closer,...
Read More

{Latest Posts}

Ransomware lock bitcoin

Understanding Ransomware: A Brief Overview

Baltimore, Maryland, Atlanta, Georgia, and South Carolina are three of the recent areas that have been grabbing headlines with reports of ransomware attacks. These attacks range from small hiccups during the business day to dispatch…

Read More »

Darknet Intelligence Secrets Revealed

Cyberattacks and data breaches are part of our day-to-day life, so much so, that people have become desensitized to these events. In every case, the customers’ compromised data recompense is “credit monitoring, free for…

Read More »
A man looks through graphs and charts of data exploitation in a futuristic black and grey room.

Social Media Data Exploitation

Former data analytics contractor Christopher Wylie blew the whistle on an independent company for harvesting the Facebook information of more than 50 million people in the United States, resulting in one of the most…

Read More »
A man in a suite stands with an umbrella as binary code rains down. The photo is a metaphor for Cybersecurity Insurance.

Cybersecurity Insurance

The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…

Read More »