Search
Close this search box.

Threats & Vulnerabilities

As threat increases, college cybersecurity programs are more in demand

Researchers show they can steal data during homomorphic encryption

Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]

Image courtesy: Brett Sayles

Colonial Pipeline attack debrief and lessons

In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s […]

A lightbulb

Throwback Attack: The Marconi wireless hack of 1903

Sometimes the gap between the unveiling of a life-altering new technology and the corruption of that technology is exceedingly small. Take, for example, wireless technology, a potent attack vector in modern times. It’s also something […]

As threat increases, college cybersecurity programs are more in demand

Researchers show they can steal data during homomorphic encryption

Homomorphic encryption is considered a next generation data security technology; but researchers have identified a vulnerability that allows hackers to steal data—even as it is being encrypted. “We weren’t able to crack homomorphic encryption using […]

Image courtesy: Brett Sayles

Colonial Pipeline attack debrief and lessons

In the past decade, we have seen an alarming increase in attacks on critical energy infrastructure, with cyber incidents occurring across any number of geographies and industries. Common attacks can involve ransomware on a corporation’s […]

A lightbulb

Throwback Attack: The Marconi wireless hack of 1903

Sometimes the gap between the unveiling of a life-altering new technology and the corruption of that technology is exceedingly small. Take, for example, wireless technology, a potent attack vector in modern times. It’s also something […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES