top of page
![](https://static.wixstatic.com/media/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,usm_0.66_1.00_0.01,enc_avif,quality_auto/11062b_c18db2b1461b46f2ad31bae61009fee1f000.jpg)
![](https://static.wixstatic.com/media/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp)
![Nation-State Backdoor Found in Cisco Firewalls (Again?)](https://static.wixstatic.com/media/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_ef536bcf0aed4fcfb538fa18b7819414~mv2.webp)
Rich Washburn
Apr 29, 20242 min read
Nation-State Backdoor Found in Cisco Firewalls (Again?)
A recent concerning discovery has been made regarding Cisco's Adaptive Security Appliances (ASAs)—a series of security devices acting...
1 view0 comments
![](https://static.wixstatic.com/media/ea5f86_b0d654ee521145f6a7a5704d6e66c64f~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_b0d654ee521145f6a7a5704d6e66c64f~mv2.webp)
![Cyber Front: Unveiling Volt Typhoon's Assault on U.S. Infrastructure](https://static.wixstatic.com/media/ea5f86_b0d654ee521145f6a7a5704d6e66c64f~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_b0d654ee521145f6a7a5704d6e66c64f~mv2.webp)
Rich Washburn
Apr 19, 20242 min read
Cyber Front: Unveiling Volt Typhoon's Assault on U.S. Infrastructure
Recent findings by Security Scorecard have cast a spotlight on the shadowy operations of Volt Typhoon, a cyber threat actor group...
5 views0 comments
![](https://static.wixstatic.com/media/ea5f86_3a787c2399ab4cdb921d5a4f4ea78e0c~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_3a787c2399ab4cdb921d5a4f4ea78e0c~mv2.webp)
![Digital Fault Lines: Microsoft’s Cybersecurity Lapse and its Global Fallout](https://static.wixstatic.com/media/ea5f86_3a787c2399ab4cdb921d5a4f4ea78e0c~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_3a787c2399ab4cdb921d5a4f4ea78e0c~mv2.webp)
Rich Washburn
Apr 4, 20242 min read
Digital Fault Lines: Microsoft’s Cybersecurity Lapse and its Global Fallout
In a revealing report by the US Cyber Safety Review Board (CSRB), Microsoft has been pinpointed as the linchpin in a series of "avoidable...
52 views0 comments
![](https://static.wixstatic.com/media/ea5f86_f9bcfb1656654cc6b039b2b1666f65bc~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_f9bcfb1656654cc6b039b2b1666f65bc~mv2.webp)
![DARPA's Vision for AGI, Cybersecurity Evolution, and the Race for AI Supremacy](https://static.wixstatic.com/media/ea5f86_f9bcfb1656654cc6b039b2b1666f65bc~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_f9bcfb1656654cc6b039b2b1666f65bc~mv2.webp)
Rich Washburn
Apr 1, 20242 min read
DARPA's Vision for AGI, Cybersecurity Evolution, and the Race for AI Supremacy
The recent revelations from DARPA, the United States Defense Advanced Research Projects Agency, have sent shockwaves through the AI...
79 views0 comments
![](https://static.wixstatic.com/media/ea5f86_326b09b541c24371b9f0089c429e5803~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_326b09b541c24371b9f0089c429e5803~mv2.webp)
![The Pizza Index & Cyber Vulnerability](https://static.wixstatic.com/media/ea5f86_326b09b541c24371b9f0089c429e5803~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_326b09b541c24371b9f0089c429e5803~mv2.webp)
Rich Washburn
Mar 25, 20243 min read
The Pizza Index & Cyber Vulnerability
In the quiet hours of the night on January 16, 1991, amidst the tensions of the Gulf War, an unsuspecting correlation between pizza...
26 views0 comments
![](https://static.wixstatic.com/media/ea5f86_3d43436a1a124ab392419be099400e85~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_3d43436a1a124ab392419be099400e85~mv2.webp)
![The CISA Cybersecurity Breach: A Wake-Up Call for National Security](https://static.wixstatic.com/media/ea5f86_3d43436a1a124ab392419be099400e85~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_3d43436a1a124ab392419be099400e85~mv2.webp)
Rich Washburn
Mar 18, 20242 min read
The CISA Cybersecurity Breach: A Wake-Up Call for National Security
The recent hack of the Cybersecurity and Infrastructure Security Agency (CISA), which oversees cybersecurity and infrastructure...
10 views0 comments
![](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
![Inside the Chinese Hacking Tools Giga Leak](https://static.wixstatic.com/media/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_3aa2de96e51b4bb89c3acc42f82940a8~mv2.webp)
Rich Washburn
Feb 21, 20242 min read
Inside the Chinese Hacking Tools Giga Leak
The recent discovery of a massive data leak, purportedly revealing the inner workings and cyber espionage tools of a Chinese company, has...
6 views0 comments
![Breach: Microsoft's Top Execs' Emails Hacked](https://static.wixstatic.com/media/ea5f86_71d0a8b07cfe4855bba4619475ba0756~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/ea5f86_71d0a8b07cfe4855bba4619475ba0756~mv2.webp)
Rich Washburn
Jan 22, 20242 min read
Breach: Microsoft's Top Execs' Emails Hacked
In late November 2023, a sophisticated digital espionage operation, led by the infamous Russian APT (Advanced Persistent Threat) group...
12 views0 comments
![WordPress sites are a problem: A Nerd's Candid Rant](https://static.wixstatic.com/media/ea5f86_370ceceb2b72460894c9f4b9b23c6c22~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/ea5f86_370ceceb2b72460894c9f4b9b23c6c22~mv2.webp)
Rich Washburn
Jan 13, 20242 min read
WordPress sites are a problem: A Nerd's Candid Rant
As a web designer “moonlighting” as a Certified Ethical Hacker (yeah, it's as cool as it sounds), I’ve witnessed WordPress security flaws...
19 views0 comments
![](https://static.wixstatic.com/media/ea5f86_fffe6108e2b44b8cbefef978637aacba~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/ea5f86_fffe6108e2b44b8cbefef978637aacba~mv2.webp)
![Global Cyber Threat Landscape 2024: In-Depth Analysis](https://static.wixstatic.com/media/ea5f86_fffe6108e2b44b8cbefef978637aacba~mv2.webp/v1/fill/w_454,h_341,al_c,q_90,enc_auto/ea5f86_fffe6108e2b44b8cbefef978637aacba~mv2.webp)
Watchtower
Jan 5, 20242 min read
Global Cyber Threat Landscape 2024: In-Depth Analysis
This report presents a broad view of the global cyber threat landscape in 2024, synthesizing insights from prominent cybersecurity...
4 views0 comments
bottom of page