
Cyber Risk Update 8 SEP 2023
Exclusive Credentials, the Keys to the Kingdom https://www.learnsecurity.org/single-post/credentials-the-keys-to-the-kingdom This is a...


Cyber Risk Update 1 SEP 2023
AI How your company might be using AI and not know it. If your enterprise is "thinking about" using generative AI, consider this from...

Cyber Risk Update 4 AUG 2023
This is a selection of this week's events. For more news and advisories, check out our discord server. Local Government Cyber Watch...


Achievement Unlocked: Relate Shark Week to Cybersecurity
In the vast ocean of pop culture, an intriguing connection exists between even the most unlikely subjects and the world of cybersecurity....

Unmasking Empty Threats Scams: How to Spot and Defend Against These Scams
Protect yourself. Empty threat scams are a common tactic used by scammers to create fear and urgency in their victims, ultimately aiming...

Cyber Risk Update 14 APR 2023
Cyber Risk Update for the week of April 14, 2023. Events Webinar "Cyber Tabletop Exercises: Mastering Cyber Resilience through Tabletop...


Discovering the History Behind Secret Societies: Truth or Fiction
I have just completed an audio course on Secret Societies, taught by Professor Richard B. Spence. Professor Spence is a historian who...


International Anticorruption Day 2022
The costs of corruption far exceeds the costs of bribes. Corruption erodes trust in public institutions, undermines environmental...

FruitFly Malware
A Justice Department indictment alleges a 28-year-old hacker from Ohio, created the FruitFly malware and spied on Apple computers for 13...

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...