Well we have made it a year. Here’s some collected humor to help through the anniversary.
Continue Reading →APR
Well we have made it a year. Here’s some collected humor to help through the anniversary.
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.Does the term unhackable send you into fits of laughter? Or make you wave your hand as if to dismiss the possibility without needing a second thought? Before you do either of those things—again—consider this: a new computer chip remains unhacked after DARPA and ...
Continue Reading →When it comes to IP transit solutions, it helps you allow network traffic to cross or transit your network. In case you have a smaller system with content providers, you’ll have a more reliable backbone for different internet networks. You’ll be able to find routes to different ISPs, which can lead to more inbound and outbound traffic. Here ...
Continue Reading →The title means “disaster of the day.” I came across this chart on Facebook. Not terribly funny, but I decided to share it here. Our elected officials in the Government, in collaboration with the Media, have concocted a lifetime of ELEs – Extinction Level Events, or disasters. The basic motive is to keep everyone in a more or less constant state of fear and agitation. A fearful populace is easier for the government to control and manipulate, and helps win ...
Continue Reading →
A quick Saturday digest of cybersecurity news articles from other sources.And the beat goes on. As researches discover more about the SolarWinds and Exchange exploits, the discovery of similar related attacks was inevitable.
Original release date: April 2, 2021
The Federal Bureau of Investigation (FBI) and CISA have released a Joint Cybersecurity Advisory (CSA) to warn ...
Continue Reading →
Catch of the Day: Fake PO Phish with Trojan
Chef’s Special: Past Due Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is to provide ...
Continue Reading →
Enterprise resource planning (ERP) software, a set of tools, shares a common process and data model, helping businesses better track information while gathering insights across the departmental spectrum. The ERP software unites segregated processes into a central data network and automates end-to-end operational processes, such as accounting, analytics, inventory management, customer relationship management (CRM), and human resources (HR) ...
A quick Saturday digest of cybersecurity news articles from other sources.HR and recruiting experts offer unique ways to find and hire cybersecurity talent. This is an excellent article about what is right and what is wrong in current cybersecurity hiring practices.
To this “researcher”, ...
Continue Reading →
Catch of the Day: DHL Shipping Phish with a side of Trojan Horse
Chef’s Special: Exchange Phish
Examples of clever phish that made it past my spam filters and into my Inbox, or from clients, or reliable sources on the Internet.
I would be delighted to accept suspicious phishing examples from you. Please forward your email to phish@wyzguys.com.
My intention is ...
Continue Reading →