Crypto Scams and What to Look For

Crypto Scams and What to Look For

First, standard disclaimer that this post is opinion and we are not licensed financial professionals, nor is anything meant to be taken as official financial advice. However, we have both direct and indirect experience with cryptocurrency and would like to share our...
Are Your Credentials on the Web?

Are Your Credentials on the Web?

Let’s Find Out! Step 1: Go to haveibeenpwned.com Step 2: Place Your Email (Never your password) Step 3: Click the “pwned?” button. Step 4: Write down all the sites  Step 5: Go to every site and change your passwords  This step should be based on prioritization...
MOVEit: What You Need to Know about CVE-2023-25708

MOVEit: What You Need to Know about CVE-2023-25708

MOVEit: What You Need to Know about CVE-2023-25708 Home » Blog MOVEit: What You Need to Know about CVE-2023-25708 The MOVEit Vulnerability, or CVE-2023-25708, is an SQL Injection vulnerability that targets the database of the MOVEit Transfer software. This is a new...
Madison Horn Joins the Critical Fault Team as CEO

Madison Horn Joins the Critical Fault Team as CEO

Madison Horn Joins the Critical Fault Team as CEO Home » Blog Madison Horn Joins the Critical Fault Team as CEO In Madison’s new role as CEO of Critical Fault, she will lead the vision and strategy for the organization while fostering a culture of growth and...
What Do Hackers Do with Stolen Data

What Do Hackers Do with Stolen Data

What Do Hackers Do with Stolen Data Home » Blog Threat Actors Many individuals may ask, “What would someone want with my data?” or “Who would want my data?” It is important to describe who wants the data because that determines what they are...