Posts about

Cyber Security

Potential NERC Alert Based on Newly Discovered Supply Chain Risks

Recent reports from multiple news outlets, including Reuters, Fox News, have revealed the presence of undocumented communication devices in Chinese-manufactured solar power inverters, posing a significant cybersecurity risk to the U.S. power grid. These hidden devices could...

Phishing & Smishing Campaigns: Steps to Protect Your Personal Info

Phishing and Smishing campaigns are becoming more advanced with the introduction of AI language models such as ChatGPT. This allows an attacker to create a more fluid and less suspicious emails that are harder to identify.

Protecting Cyber Security Assets

There are 5 main core functions of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover. Let’s focus on the importance of the core function of Protection.

What does the ransomeware attack on Colonial pipeline mean for the future of critical infastructure protection?

On May 7th, Colonial Pipeline was forced to shut down operations as a result of a ransomware attack. The shutdown lasted until May 12th and the effects of the shutdown were felt long after. Colonial Pipeline supplies 2.5 million barrels of fuel daily to the southeastern US....

Cyber Security Bulletin:  Kaseya Attack Recommendations

The Kaseya attack was a zero-day exploit attack that took down the servers that are used to provide VSA SaaS (Virtual System/Server Administrator Software as a Service). The VSA SaaS software then infected and locked down the computers running the software. This attack...