Cyber Daily

Natural Language Processing (NLP) and All That Comes With It

Natural Language Processing (NLP) and All That Comes With It

People don’t often think about the ambiguities that come with human language. They use language as an intuitive behavior to...
Read More
What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and...
Read More
Blockchain Smart Contracts and Supply Chain Security

Blockchain Smart Contracts and Supply Chain Security

With the ignominious demise of FTX in recent months, cryptocurrency has been much in the news of late for all...
Read More
How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the...
Read More
Revelations From CISA Proves Phishing is a Public Menace

Revelations From CISA Proves Phishing is a Public Menace

A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on...
Read More

{Latest Posts}

Digital ID Proofing: Testing...Now Complete

Digital ID Proofing: Testing…Now Complete

Digital Identity (ID) Proofing—also known as digital identity authentication or digital ID verification using computer technology—is an increasingly important aspect of online security.  Even if you’re doing business only online, you still need to be

Read More »
DDoS Protection

4 Actions to Improve DDoS Protection

Distributed Denial of Service (DDoS) attacks are increasing in the sheer volume and size of attacks and their impact, severity, and sophistication. Therefore, DDoS attack protection is also becoming more complex and challenging. Simply using

Read More »