Ryan Kessler

Veroot's ISO 27001 Journey and What it Means
Achieving ISO 27001:2022 certification is a significant milestone for any company, particularly for those in the compliance software industry. For...

Chrome Extensions: A persistent Target for Cyber Threats
Browser extensions for Chrome often become prime targets for hackers, serving as gateways to exploit unsuspecting users. This underscores a crucial...

Unmasking VEILDrive: How Threat Actors Are Exploiting Microsoft SaaS to Spread Malware
Unmasking VEILDrive: How Threat Actors Are Exploiting Microsoft SaaS to Spread Malware** A sophisticated cyber threat campaign known as "VEILDrive"...

Lessons from CrowdStrike Incident
In an era where cyber threats are growing more sophisticated and ubiquitous, even the most well-established cybersecurity companies are not immune to...

KnowBe4's Unintentional Recruitment of a North Korean Hacker: A Cautionary Tale
### KnowBe4's Unintentional Recruitment of a North Korean Hacker: A Cautionary Tale In a startling incident, Clearwater-based cybersecurity firm...

Chinese Spy Cranes, Ransomware, and the Biden Executive Order on Maritime Cyber Security
In July 2023, Nagoya, Japan's largest port, was hit by lockbit ransomware, halting operations and forcing Toyota to halt import-export packaging...

Ransomware, How Hackers Hold Your Files Against You.
What is Ransomware?

Ensuring the Cybersecurity of Electronic Logging Devices: A Call to Action from Colorado State University Researchers
In a recent study conducted by researchers from Colorado State University, Electronic Logging Devices (ELDs) have been identified as significant...

Securing Email Logins With MFA.
Learn how Multi-Factor Authentication (MFA) can enhance the security of software and email logins.

Detecting Compromised Emails with Huntress MDR for Microsoft 365: Enhancing Cybersecurity
In the ever-evolving landscape of cybersecurity threats, email remains one of the most common vectors for attacks. Cybercriminals continuously refine...

$25.6 Million Swindled by using Deepfake Technology in Virtual Meeting
In a recent cyber security breach at a prominent multinational corporation, a finance employee fell victim to a sophisticated scam orchestrated by...