Overview—Could This Ransomware Breach Have Been Prevented? In mid-2023, the State Bar of Texas experienced a ransomware attack...
News
Dr. Mike Saylor to Present at this Year’s Secret Service Cybersecurity Conference — Spring 2025 NTCFTF Conference
Navigating Cybersecurity and Operational Resilience in the SEC’s 2025 Examination Priorities
Introduction: A New Era of Cyber Vigilance In an increasingly digitized financial landscape, the U.S. Securities and...
Protecting Mid-Market Automotive Dealerships with Blackswan Cybersecurity & Stellar Cyber Open XDR
Overview Automotive dealerships are increasingly becoming prime targets for cyberattacks. With 15% of all...
The CannonDesign Ransomware Attack & How MDR Can Prevent Business-Disrupting Cyber Threats
The Incident: Ransomware Strikes a Leading Architectural Firm w/ 1,500 Employees In January 2023, CannonDesign, a...
MDR Cybersecurity Myths Debunked
Why MDR is Essential for Cybersecurity Resilience in an Evolving Threat Landscape Many companies rely on firewalls, antivirus software, and endpoint protection, but these solutions alone are no longer enough. Managed Detection and Response (MDR) bridges the gap by providing 24/7 threat monitoring,...
PRESS RELEASE: Introducing Cyber EDGE: A Transformational Cyber Education Program to Build the Next Generation of Cyber Defenders
DALLAS, TX – March 20, 2025 – To address the urgent cybersecurity workforce shortage and enhance national cyber...
CISA Cybersecurity Advisory — #StopRansomware: Medusa Ransomware
Cybersecurity Advisory #StopRansomware: Medusa Ransomware Release Date March 12, 2025 Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors....
Lazarus Hackers Exploiting IIS Servers: How to Protect Your Organization
Overview The Lazarus Group, a notorious state-sponsored hacking collective,...
Malvertising Strikes Again: How Cybercriminals Used GitHub to Infect 1M Windows Users
In the ever-evolving landscape of cyber threats, malicious actors are continuously finding new ways to infiltrate...