Posts filed under: Cybersecurity

Highlight Your Resume with a Certificate! FPS Technical Data and Intellectual Property Certificate The FPS Technical Data and Intellectual Property Certificate program effectively blends detailed instruction with practical, hands-on exercises that are designed to explain and reinforce the complex legal rules and...
Continue Reading →
Webinars & Webinar Series Introduction to Cybersecurity 4-part On-Demand Webinar Series | $395 Catching the Next Wave of DFARs Cybersecurity Compliance On-Demand Webinar | $100 CFIUS Revamped: Major Changes Under the New Regulations On-Demand Webinar Series | $249 Cybersecurity Maturity Model Certification (CMMC)...
Continue Reading →
Beginner/Intermediate Courses The Framework of Cybersecurity Law May 3 | FPS Virtual Course July 26 | Hilton Head, SC The Basics of IT Acquisition and Contracting May 4 | FPS Virtual Course July 27 | Hilton Head, SC Cloud Security and FedRAMP Fundamentals May...
Continue Reading →
Check Point Research and Otorio published a blog post describing the campaign, in which stolen information was dumped on compromised WordPress domains.   The recent phishing attack began with one of several fraudulent email templates and would mimic Xerox/Xeros scan notifications...
Continue Reading →
Chinese hackers are gathering passenger details from airlines across the world to track high-value targets’ movements.  The intrusions have been linked to a threat actor that the cyber-security has been tracking under the name of Chimera.  The initial report mentioned a...
Continue Reading →
FireEye Mandiant announced the release of an open source tool designed to check Microsoft 365 tenants for the use of techniques associated with UNC2452, the threat group that attacked IT management company SolarWinds.  UNC2452 has used some sophisticated techniques to...
Continue Reading →
The Federal Bureau of Investigation has issued a Private Industry Notification (PIN) to warn of attacks targeting enterprises, in which threat actors attempt to obtain employee credentials through vishing or chat rooms.  The COVID 19 pandemic has forced the broad...
Continue Reading →
In an advisory issued on Wednesday, CISA (Cybersecurity and Infrastructure Security Agency) revealed that hackers have been employing successful phishing campaigns, brute force login attempts, and potentially pass-the-cookie attacks to exploit weaknesses in cloud security practices. In a pass-the-cookie attack, hackers steal...
Continue Reading →
Austria-based cybersecurity consultancy SEC Consult discovered five types of vulnerabilities in Pepperl+Fuchs Control industrial products, including cross-site request forgery (CSRF), reflected cross-site scripting (XSS), blind command injection, and denial-of-service (DoS) issues. The impacted products were found to leverage outdated versions...
Continue Reading →
The Chinese company has been accused of spying on millions of Android TikTok users using a technique banned by Google.  According to a Wall Street Journal report, TikTok used a banned tactic to bypass the privacy safeguard in Android to collect unique...
Continue Reading →