A blog about cyber.
-

CMMC 2.0: Cybersecurity Requirements for Government Contractors in 2025
In 2025, the United States Department of Defense is placing strong emphasis on defense contractors to stay ahead of evolving cybersecurity threats. CMMC compliance isn’t just a recommendation—it’s a requirement…
-

How abuse and manipulation of access tokens leads to compromise
With the increase in the number of online accounts each individual uses, many online services now provide a “Sign in with…” option for users to use credentials from other identity…
-

Chinese Government contractor leak reveals spyware tools
Check out my post on Gridware‘s blog!
-

Initial Access Brokers and Cyber Threat Intelligence
Every time I see a new cyber incident on the news, or start working on a new incident, the first question that pops up in my mind (much like many…
Any feedback?