Blog

  • Cybercrime as a Business

    Cybercrime has evolved into a sophisticated and organized business model, adopting principles and functions similar to legitimate enterprises. Criminal organizations involved in cybercrime operate with a high degree of specialization, coordination, and efficiency. Here is an overview of the various functions and departments within a modern cybercrime enterprise: Management and Leadership Cybercrime organizations exhibit a… Read more

  • An Introduction to ACH Security

    ACH (Automated Clearing House) payments are subject to federal regulations and are managed by the National Automated Clearing House Association (NACHA). To register within this network, users must provide the following information: These registration steps bear similarities to the Payment Card Industry Data Security Standard PCI-DSS for credit cards. But ACH payments are not obligated… Read more

  • Emergency Management in Montgomery County, Maryland

    Emergencies and disasters can strike without warning, and Montgomery County, Maryland, is no exception. In his October 29, 2023, presentation to the Montgomery County (Maryland) Citizen Academy Alumni Association, Patrick Fleming, Emergency Preparedness Specialist, with the Montgomery County Office of Emergency Management and Homeland Security (OEMHS), described the potential hazards faced by Montgomery County, the… Read more

  • AI and Our Adversaries

    The September 2023 installment of Crowdstrike’s Adversary Universe Podcast covered Artificial Intelligence’s potential for strengthening adversarial attacks. Adam Meyers and Cristian Rodriguez raised several key points to for the cybersecurity profession to consider: Meyers and Rodriguez underscore the complex and evolving nature of AI’s role in attack campaigns. As is the case with most technological… Read more

  • Beware of AI Phishing Emails

    How Novice Black Hat Hackers Are Using Artificial Intelligence to Steal Your Personal Information A new underground tool known as WormGPT has emerged, presenting a disturbing development in the realm of generative artificial intelligence (AI). Unlike its ethical counterpart ChatGPT, WormGPT lacks abuse prevention mechanisms, making it a potent weapon for cybercriminals. The discovery of… Read more

  • Cyberstalking

    Emily had always been a private person. She valued her online privacy andtook precautions to protect herself. But little did she know that lurking inthe shadows of the digital world was a relentless predator waiting for theperfect opportunity to strike. It started innocently enough. Emily noticed strange friend requests on her social media profiles from… Read more

search previous next tag category expand menu location phone mail time cart zoom edit close