Make Assessments and Prepare for the Unknown
In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering…
Defend Your Systems
In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering…
The issue of What can be used for us will be used against us. I.e. We want to use the internet – it will be used to attack us. So…
JDSupra among other ezines on the Internet have cataloged the Lewis & Clark College in Portland hack Basically in March 2023 the administrators or others at the college learned that…
Quishing – the QR code that sends you to download bad stuff Let’s go back to what is a QR code from digital.gov? QR codes (or Quick Response codes) are…
Hackernews has another story about exploited devices: Archer routers This router the Archer TP link “The botnet exploits a remote code execution (RCE) vulnerability in TP-Link Archer routers (CVE-2023-1389) to…