top of page


-
Feb 192 min read
ADVISORY: Phishing Threat to Southeastern Government Agencies
A Sophisticated Attack on Government Agencies Cybercriminals are becoming increasingly bold, and a recent phishing campaign targeting...

-
Dec 13, 20244 min read
Quantum Computing’s Next Chapter: The Willow Chip and the Future of Security
For years, quantum computing has been the epitome of technological futurism, offering glimpses of solving previously insurmountable...


-
Oct 2, 202414 min read
Simplifying Cybersecurity: The SLM Method
A cybersecurity framework anyone can follow


-
Aug 26, 20244 min read
Hacked Vision: OTM Cyber Uncovers Surveillance Camera Software Exploiting US Businesses and Agencies
OTM Cyber Uncovers Surveillance Camera Software Exploiting US Businesses and Agencies


-
Jul 25, 20241 min read
OTM Cyber Unveils the Future: A Successful Hybrid Training Week!
This week, OTM Cyber conducted an internal hybrid in-person and virtual training for the launch of our new OTM CyberSystem. We learned a...

-
Jun 21, 20242 min read
Hacking the Whole Internet: The XZ Attack Exposed
In a chilling revelation, the XZ Attack demonstrated how a single vulnerability could create a backdoor across the entire backbone of the...

-
Jun 5, 20241 min read
The Cyber Pyramid of Pain
The Cyber Pyramid of Pain is a crucial concept for detection engineering and defense strategies. Developed by David Bianco,...
bottom of page