(847) 796-3177 [email protected]
The White House on BGP Security

The White House on BGP Security

In an era where cybersecurity threats loom larger than ever, The White House has taken a significant leap forward in addressing one of the Internet’s most critical vulnerabilities. The Border Gateway Protocol (BGP), the backbone of internet routing, has long...
YubiKey Vulnerability Discovered

YubiKey Vulnerability Discovered

A YubiKey vulnerability discovered! YubiKeys, popular security devices used for two-factor authentication, have been found to be vulnerable to cloning attacks. This discovery was made by researchers from the NinjaLab in France. What are YubiKeys? YubiKeys are small...
CrowdStrike Response to Outage

CrowdStrike Response to Outage

CrowdStrike, a prominent cybersecurity firm, recently faced criticism from its competitors following a major software update failure that led to a global IT outage. Michael Sentonas, CrowdStrike’s president, expressed his discontent with what he described as...
Russian hackers using spyware exploits

Russian hackers using spyware exploits

Google has recently uncovered concerning evidence that Russian government hackers are utilizing spyware exploits that are closely linked to those developed by well-known spyware creators: Intellexa and NSO Group. This revelation was made public in a blog post by...
The Rise of Blockchain Technology

The Rise of Blockchain Technology

Blockchain technology has emerged as one of the most transformative innovations of the 21st century. As a decentralized and secure way of recording transactions, blockchain has far-reaching implications across various industries. This blog post explores the...