top of page

Search


CISA Director Lists Nation-State Actors, Cybercriminals, Disinformation as Top COVID Attack Vectors
Assessing the current threat landscape six months into the COVID-19 pandemic,

Daryl Haegley: (CS)²AI Fellow
1 min read


Cyber-Risks Explode With Move to Telehealth Services
The hasty shift to online delivery of primary care services since the COVID-19 outbreak has attracted significant attacker interest.

Daryl Haegley: (CS)²AI Fellow
3 min read


White House Issues New Cybersecurity Policy for Space Systems
The National Space Council issued new cybersecurity principles to help defend America’s space systems Sept. 4.

Daryl Haegley: (CS)²AI Fellow
1 min read


Six Critical Vulnerabilities To Enable OT Supply Chain Attack
“Security researchers have discovered six critical vulnerabilities in third-party code which could expose countless operational tech . . .

Daryl Haegley: (CS)²AI Fellow
1 min read


Spyware Labeled ‘TikTok Pro” Exploits Fears of US Ban
Researchers have discovered a new Android spyware campaign pushing a “Pro” version of the TikTok app that is exploiting fears among. . .

Daryl Haegley: (CS)²AI Fellow
1 min read


City of Baltimore Ransomware Attack: Lessons Learned
“Nowadays, cybercriminals are becoming increasingly hooked on big game hunting. Public institutions ranging from educational facilities . .

Daryl Haegley: (CS)²AI Fellow
1 min read


In the Crosshairs: Building Control Systems by (CS)²AI Fellow, Fred Gordy
Building automation systems have historically been installed with convenience in mind. Isn’t that why facility managers started using a brow
fredgordy
8 min read


The Chairman's Minute: Members Helping Members
I urge you join our members helping members efforts by joining the (CS)2AI community as a global member, partner, contributor . . .

Derek Harp, Chairman & Founder
1 min read


How to Hack into Vulnerable ICS Project Files
Gaining the ability to execute remote code on an ICS network via phishing attacks

Trisha Harp
4 min read


DEF CON takes CTF into Space
Hack-a-Sat participants took over the ground station and gained control of actual satellites.

Trisha Harp
3 min read


DHS CISA Completes “Cyber Storm” Exercise
Three-day exercise Cyber Storm simulates attacks on critical infrastructure systems

Trisha Harp
2 min read


Cyberattacks on US companies skyrocketed by 93% in the last 12 months
Great majority of respondents attribute rise to employees working from home during COVID-19 crisis.

Trisha Harp
3 min read


U.S. Army Report Describes North Korea's Cyber Warfare Capabilities
300+page report detailing the 6,000 strong Cyber Warfare Guidance Unit, its activities, methods and capabilities.

Trisha Harp
2 min read


Tor Exit Nodes Hacked to Perform SSL-Stripping Attacks
At peak, attackers controlled 25% of all Tor exit relays; used to perform MitM attacks on users.

Trisha Harp
3 min read


NSA and CISA Alert Highlights Urgency for OT Security
Recent alert distinct in including broad warnings of an imminent and serious threat across all 16 critical infrastructure sectors . . .

Trisha Harp
4 min read


COVID-19 Cybersecurity Suggestions: SME Thoughts on Cybersecurity During a Pandemic
June 10, 2020 Derek Harp, Founder of (CS)²AI sits down with subject matter experts Dr. Eric Cole: CEO of Secure Anchor Consulting; Rick...

Trisha Harp
1 min read


The Chairman's Minute: The COVID-19 Treadmill
The Covid-19 Treadmill
The last 60 days have been quite an experience to say the least.

Derek Harp, Chairman & Founder
1 min read


(CS)²AI COVID19 Impact Flash Poll Results - May 2020
(CS)²AI conducted a flash poll to gauge our members’ perspectives on this unprecedented COVID-19 situation.

Trisha Harp
2 min read


Department of Defense Cyber Crime Center (DC3) vul discl program
DC3’s mission is to deliver superior digital and multimedia (D/MM) forensic services, cyber technical training, vulnerability sharing ...

Trisha Harp
1 min read


FYSA - Visionaries must step forward to advance water infrastructure | Smart Cities Dive
Visionaries must step forward to advance water infrastructure

Trisha Harp
4 min read
bottom of page