Cyber threats are evolving—and so are the stakes. Among the most dangerous and complex forms of attack are Advanced Persistent Threats (APTs). These aren’t your average malware infections or brute-force login attempts. APTs are long-term, highly targeted attacks, often carried out by skilled and well-funded adversaries. Their goal? To silently infiltrate an organization’s network or […]
In the vast ocean of cyber threats, where phishers cast their nets wide to catch unsuspecting individuals, there lurks a more targeted and dangerous predator: the “whaler.” Unlike broad phishing campaigns, whaling attacks set their sights on the biggest catches – high-level executives within an organization. These aren’t random attempts; they are meticulously crafted and […]
The clock is ticking, and the landscape of cybersecurity for the Defense Industrial Base (DIB) has officially shifted. The CMMC Compliance 2.0 final rule is in effect of late 2024, and that means one thing: it’s time to get serious about your cybersecurity posture, or risk being left out in the cold. For years, the […]
In our increasingly interconnected lives, the smartphone has evolved from a mere communication tool to a central hub for our finances, personal memories, and access to a vast digital realm. But this brings with it a critical responsibility: safeguarding the wealth of sensitive information residing within these pocket-sized devices. Neglecting smartphone security tips can expose […]
Cyber threats continue to evolve — and therefore so do our defenses. One of the most advanced and elusive threats facing businesses today is the zero knowledge cyberattack. These attacks are stealthy, automated, and often don’t require any prior knowledge of a target’s systems to succeed. As cybercriminals leverage AI and automation, businesses must rely […]
We all know the importance of securing our business digital environments. We invest in firewalls, train our employees, and diligently patch our systems. But what if the threat doesn’t come knocking directly at our door? What if it lurks in a place our employees visit every day, a seemingly safe and familiar online watering hole? […]
In today’s ever-evolving threat landscape, the term “malware” often conjures images of viruses, ransomware, and trojans – malicious software designed to infiltrate and harm our systems. While these threats remain significant, a new breed of attacks is gaining traction: malware-free attacks. These intrusions often bypass traditional security measures by leveraging legitimate system tools and processes […]
The firsthand account of investigating the Rhysida ransomware operation written in the blog last week offers a chilling look into the tactics and potential reach of modern cybercriminals. While the initial focus was on helping “Victim_Zero,” this deep dive into Rhysida’s infrastructure revealed a much broader impact, extending far beyond a single compromised organization. This […]
In today’s digital world as cybercriminals are continually evolving their tactics to exploit unsuspecting users online. One of the latest threats that have emerged is from websites known as Classiscam. These deceptive sites are part of a growing trend of online fraud that targets users through fake classified ads, making them one of the most […]
Background My name is Leland but, you can call me “c0mmrade” if you’d like. I’m a Security Researcher and Senior SecOps Engineer for CTS. I’ve worked in the tech space in varying capacities for over 24 years, and exclusively in Infosec the past 3 years. I’ve considered myself a hacker since the first time I […]





