All 10 /Child Safety 1 /Cloud Security 0 /CMMC 0 /Compliance 0 /Computer Forensics 0 /Conference 0 /CSI: Cyber Recap 0 /Cyber Resilia 0 /Cyber Resilience 0 /Cyber Resiliency 0 /Documentary 0 /Education 1 /Events 0 /Featured 2 /Frontpage Article 0 /General Security 8 /Hack 3 /Headline 0 /How-to 0 /Images 0 /Incident Response 0 /Infographic 0 /International Security 0 /Internet Safety 1 /Interview 0 /IT Certifications 0 /Linux 0 /Mac OS X 0 /Malware 1 /Mobile Security 0 /News 0 /OSINT 2 /Podcast 0 /Privacy 0 /Publications 0 /RESILIA 0 /Review 0 /Security Advisory 0 /Security Defitions 0 /Security Job 0 /Security Magazine 0 /Security Practitioners 0 /STEM 1 /The SecurityOrb Show 0 /Top 5 1 /Training 0 /Uncategorized 0 /Video 0 /Vulnerability 0 /Vulnerability & Threat Report 0 /Vulnerability Assessment 0 /Web Security 0 /Windows Security 0 /Wireless Security 0
Top 5 Open Source Vulnerability Security Scanning Tools
Nmap: Nmap is a powerful open source network exploration…
April 21, 2023/by Kellep CharlesThe Benefits of Sock Puppets in Open-Source Intelligence (OSINT)
A Sock Puppet is fake persona, or an alternative online identity used to collect and investigate open-source information on a target.
September 25, 2022/by Kellep CharlesThe Open-Source Intelligence (OSINT) Cycle
Open-source intelligence, or OSINT, refers to the process of collecting information from public and legal data sources to serve a specific function. Some open sources components might include social media, videos, blogs, news, and the web (surface, Deep and Dark Web).
September 19, 2022/by Kellep CharlesBenefits of STEM Summer Camps
STEM summer camps can make summer learning fun and exciting by teaching kids about science, technology, engineering, and math. The camps can give children an opportunity to continue learning more about a concept they were introduced to during the school year or event explore different STEM concepts they may not learn about in their classrooms.
March 20, 2022/by Kellep CharlesU.S. Can Expect to see more Ransomware Attacks
In the cybersecurity space, there are many things we do not all agree on, but one thing I have noticed in the past year is that we all agree that the U.S. can expect to see more ransomware attacks as the nation recover from recent attacks which included the District of Columbia Police Department, The Colonial Pipeline and now the JBS meat plant. These will continue to increase, especially in the state, local environment, as well as in the critical infrastructure and manufacturing space.
There are two main reasons for this trend:
1. Organizations are not implementing the basic security controls thus allowing attackers to take advantage of easy attack vectors. A major of the critical infrastructure in the U.S. are operated by private organizations with very little IT and security regulations.
2. Many organizations are frequently deciding to pay the ransom after they have been attacked. Security researchers and law enforcement often recommend organizations not to pay the ransoms, but when stakeholders and the media are applying pressure, organizational leader must do what is best for the organization. This validates the ransomware industry and their frequency and tactics become more sophisticated.
This recent attack seems to have a Russian’s group fingerprint associated to it just like the pipeline event. Many security researchers, law enforcement officials and politicians are recommending in conjunction to increasing regulations on U.S. based organizations, the U.S. must also impose sanctions against countries that allow these types of activities to occur inside their borders.
June 2, 2021/by Kellep CharlesThere are two main reasons for this trend:
1. Organizations are not implementing the basic security controls thus allowing attackers to take advantage of easy attack vectors. A major of the critical infrastructure in the U.S. are operated by private organizations with very little IT and security regulations.
2. Many organizations are frequently deciding to pay the ransom after they have been attacked. Security researchers and law enforcement often recommend organizations not to pay the ransoms, but when stakeholders and the media are applying pressure, organizational leader must do what is best for the organization. This validates the ransomware industry and their frequency and tactics become more sophisticated.
This recent attack seems to have a Russian’s group fingerprint associated to it just like the pipeline event. Many security researchers, law enforcement officials and politicians are recommending in conjunction to increasing regulations on U.S. based organizations, the U.S. must also impose sanctions against countries that allow these types of activities to occur inside their borders.
Bad Ending for Washington, D.C.’s Metropolitan Police Department (MPD) after a Ransomware Attack
A group of ransomware hackers known as “Babuk” leaked internal police files from the Washington, D.C. Metropolitan Police Department (MPD). The information was stolen in late April.
May 11, 2021/by Kellep CharlesColonial Pipeline Ransomware Attack
One of the nation's largest fuel pipelines has been forced to shut down after being affected by a ransomware cyberattack. Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment.
May 9, 2021/by Kellep CharlesRansomware attack leads to shutdown of major U.S. pipeline system
By: David E. Sanger
A cyberattack forced the shutdown of one…
May 8, 2021/by Kellep CharlesA cyberattack forced the shutdown of one…
The Cybersecurity Job Gap and How Getting Women in STEM can Help [Video]
As previously stated, Researchers at Cybersecurity Ventures detailed in a 2019 post there would be 3.5 million unfilled cybersecurity positions globally in 2021, but with the addition of 700,000 additional skilled practitioners according to a Cybersecurity Workforce Study that entered the field this year, the projected number has dropped to approximately 3,21 million.
May 3, 2021/by Kellep CharlesSocial Media Safety Awareness Tips
Social media provides a way to stay connected and share with others, but did you know that the cyber criminals will also use social media as another technique to conduct their attacks. It is important to protect yourself as well as know the common signs of someone trying to trick or scam you.
May 3, 2021/by Kellep CharlesINTERESTING LINKS
Bellow are some interesting links for you! Enjoy your stay :)
Latest News
- The Benefits of Sock Puppets in Open-Source Intelligence (OSINT)September 25, 2022 - 7:22 pm
- The Open-Source Intelligence (OSINT) CycleSeptember 19, 2022 - 7:25 am
- Non-sensitive PII + Sensitive PII = Sensitive PIIApril 30, 2021 - 8:55 pm
Business Hours
Our support Hotline is available 24 Hours a day: (240) 880-8947
- Monday-Friday: 9am to 5pm
- Saturday: 10am to 2pm
- Sunday: Closed