top of page


ADVISORY: Phishing Threat to Southeastern Government Agencies
A Sophisticated Attack on Government Agencies Cybercriminals are becoming increasingly bold, and a recent phishing campaign targeting...
-
Feb 192 min read

Quantum Computing’s Next Chapter: The Willow Chip and the Future of Security
For years, quantum computing has been the epitome of technological futurism, offering glimpses of solving previously insurmountable...
-
Dec 13, 20244 min read


Simplifying Cybersecurity: The SLM Method
A cybersecurity framework anyone can follow
-
Oct 2, 202414 min read


Hacked Vision: OTM Cyber Uncovers Surveillance Camera Software Exploiting US Businesses and Agencies
OTM Cyber Uncovers Surveillance Camera Software Exploiting US Businesses and Agencies
-
Aug 26, 20244 min read


OTM Cyber Unveils the Future: A Successful Hybrid Training Week!
This week, OTM Cyber conducted an internal hybrid in-person and virtual training for the launch of our new OTM CyberSystem. We learned a...
-
Jul 25, 20241 min read

Hacking the Whole Internet: The XZ Attack Exposed
In a chilling revelation, the XZ Attack demonstrated how a single vulnerability could create a backdoor across the entire backbone of the...
-
Jun 21, 20242 min read

The Cyber Pyramid of Pain
The Cyber Pyramid of Pain is a crucial concept for detection engineering and defense strategies. Developed by David Bianco,...
-
Jun 5, 20241 min read
bottom of page