James McCarterLog4j Java vulnerability is devastating, so what can you do to protect yourself?One of the most popular logging libraries in Java, Log4j, was recently discovered to have serious cybersecurity vulnerabilities. While the…Dec 13, 2021Dec 13, 2021
James McCarterTardigrade Malware Targets Biomanufacturing IndustryThe Tardigrade malware, which has, in a much simpler form been infecting industrial control systems since the mid-2010s, now appears to be…Nov 23, 2021Nov 23, 2021
James McCarterinShadowscapeHow non-state hackers target the commodities sector across the USIt has now become clear that “critical infrastructure” includes all of us.Jun 20, 2021Jun 20, 2021
James McCarterinShadowscapeAttacking a GiantThere is a distinct possibility that World War 3 could be fought on a digital battlefield. Cyber-attacks that were earlier the SOP of…Mar 19, 2021Mar 19, 2021
James McCarterinShadowscapeCybersecurity in the Time of Covid: Trends To Look Out for in 2021The US Treasury is the latest victim on the long list of cyber-attacks that have taken place in this unprecedented, pandemic-ridden year…Feb 14, 2021Feb 14, 2021
James McCarterinShadowscapeKNOW THYSELF// KNOW THY ENEMY“If you know the enemy and know yourself, you need not fear the result of a hundred battles. If you know yourself but not the enemy, for…Jan 19, 2021Jan 19, 2021