Cybersecurity threats are evolving rapidly, and 2025 is shaping up to be a year where cybercriminals up their game with more advanced tactics. However, businesses don’t have to be caught off guard. By staying informed and proactive, you can protect your organization from emerging cyber risks. This...
Resources
News
View All
Blackswan’s OSINT Cybertruck Challenge – #8
Blackswan's OSINT Cybertruck Challenge - #8 Happy Hunting!
Cyber Workforce Development/Alignment: Results of a Qualitative Study — by Dr. Michael Saylor
OVERVIEW The rising risk of cybersecurity threats in U.S. organizations is worsened by a global shortage...
Videos/Podcasts
View All
Cyber Workforce Development / Alignment: Results of a Qualitative Study (ISC2 DFW, March 2024)
This webinar was recorded during the March 2024 meeting of the ISC2 DFW Chapter, where Dr. Mike Saylor presented the findings of his Doctoral Thesis: Cyber Workforce Development / Alignment: Results of a Qualitative Study. The issue addressed in this research is the heightened vulnerability of...
AI: The Good, the Bad, and the Ugly for Business — Mike Saylor, CEO
In this episode of the Hitchhiker’s Guide to IT podcast, host Michelle Dawn Mooney discusses the nuances of modern IT management, focusing on artificial intelligence (AI), with guest Mike Saylor, CEO of Black Swan Cybersecurity. The conversation explores the evolution of AI, its positive...
Blackswan Cybersecurity CEO, Prof. Mike Saylor — Short Testimonial on Stellar Cyber Open XDR
Blackswan Cybersecurity CEO, Prof. Mike Saylor discusses Stellar Cyber Open XDR and why it was Blackswan's preferred platform in 2023. “An MSSP should be capable enough to focus on what the client’s true needs are both from a services and technology perspective, but also being as economical...
Threat Advisories
View All
Voldemort Malware Exploiting Google Sheets
SUMMARY A new malware campaign was recently identified, which leverages Google Sheets as a command-and-control (C2) platform. This campaign...
Critical Vulnerability in SonicWall Firewalls Allows Unauthorized Access
Summary SonicWall issued patches for a critical vulnerability (CVE-2024-40766) affecting its firewalls. The flaw could allow unauthorized...
Lazarus Group Exploits Windows Driver Zero-Day to Deploy Rootkit
SUMMARY The Lazarus hacking group exploited a zero-day vulnerability in the Windows AFD.sys driver (CVE-2024-38193) to elevate privileges and...
Flyers
View All
Cyber Hygiene Preventative Care
Full Lifecycle Cybersecurity
Personal Cyber Protection
Personal Cybersecurity & Privacy for Executives, Board Members & Key Personnel That Protects Your Company and Your Peace of Mind DOWNLOAD...
Blogs
View All
Navigating Uncertainty: An Essential Guide to Organizational Risk Assessments
Author: Tangela Sampson (Intern, Spring 2024) Introduction to Risk Assessments A Cybersecurity Risk Assessment is a structured and comprehensive procedure implemented within an organization to identify, evaluate, and manage potential risks, threats, or vulnerabilities originating from the...
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments
Unveiling Risk: A Look into the Methodology and Importance of Vulnerability Assessments Author: Tangela Sampson (Intern, Spring 2024) A vulnerability assessment is a process of identifying security deficiencies and evaluating and categorizing potential vulnerabilities in an organization’s...
Penetration Testing 101
In a world driven by constantly growing technology, where cyber threats and data breaches are common, proactive security measures must be taken. Cybersecurity is a critical aspect that can deeply impact or cripple any company. As businesses rely on technology more and more to store, process, and...