Microsoft addressed 57 Common Vulnerabilities and Exposures (CVE’s) this month with 7 marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: Windows …
The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 2)
Professional & Organized: How the GTSEZ Encourages the Multi-functional Criminal Enterprise, and What To Do About It By Chuck Mackey Introduction In Part 1, we introduced you to the Golden …
The Golden Triangle: Welcome to the Modern Wild, Wild, East (Part 1)
Introduction In 2007, the Lao government, in collaboration with the Hong Kong-registered Kings Romans Group, established the Golden Triangle Special Economic Zone (GTSEZ)[1] in the Ton Pheung District of Bokeo …
Security & Threat Updates – February 2025:
Microsoft addressed 63 Common Vulnerabilities and Exposures (CVE’s) this month with 4 marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: Windows …
Cyber Briefing: Privacy and Security Considerations for DeepSeek AI
DeepSeek AI, a Chinese artificial intelligence platform, has recently made waves with its advanced capabilities, rivaling top AI models from OpenAI and Meta. However, its rise has not been without …
Understanding the Known Knowns, Known Unknowns, and Unknown Unknowns in Cybersecurity
In cybersecurity, navigating the murky waters of risk management requires a deep understanding of the “known knowns,” “known unknowns,” and “unknown unknowns.” These concepts, borrowed from military strategy, are incredibly relevant as businesses face increasingly sophisticated cyber threats in a constantly shifting landscape.
Security & Threat Updates – January 2025:
Microsoft addressed 159 Common Vulnerabilities and Exposures (CVE’s) this month with 8 marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: Windows …
How the Grinch Stole Your Cookies: A Christmas Tale of AiTM Phishing Attacks
In the bustling city of Cyberville, the holiday season was in full swing, while a sinister threat lurked in the shadows of the digital world.
A Quick Case Study in Zero Trust Architecture
By Chuck Mackey, Fortress Security Risk Management Senior Security Principal You work in a bustling hospital. Physicians, nurses, and administrative staff are constantly on the move, accessing patient records, medical …
Security & Threat Updates – December 2024:
Microsoft addressed 74 Common Vulnerabilities and Exposures (CVE’s) this month, 1 which was marked as zero-day vulnerability. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below: Microsoft Vulnerabilities: …
Is Your Cyber Tech Stack the Right One?
Is your cybersecurity ecosystem future-ready, agile, and aligned with your business goals? If not, it’s time for a serious upgrade.
“My Data is Safe in the Cloud”—Truth or Dangerous Fallacy?
In the Cloud, safety is a shared responsibility—one that businesses must take seriously to protect their most valuable asset: their data.
