Introducing Cybersecurity to the 5th Grade

Hudson Alpha Bio Security Lab CTF

UAH Cyber Research Center Tour

Data Privacy on Websites Discussion

Simulating DDOSing Drones

AgroTerrorism Escape Room

2025 National Cyber Summit

Protected: Darknet Diaries – The Courthouse

There is no excerpt because this is a protected post.

High-performance mice can be used as a microphone to spy on users thanks to AI — Mic-E-Mouse technique harnesses mouse sensors, converts acoustic vibrations into speech | Tom’s Hardware

The processing works like this: the raw audio data is run through digital signal processing using a Wiener Filter, where you can start to hear some information. This is then further cleared up through a neural model, giving the researchers clear audio.

Cyber criminals pull off $1.5 million heist, exploiting Baltimore’s outdated defenses

A cyber heist has cost the city more than $1.5 million after thieves manipulated the city’s electronic Workday system, according to a report released this week by Inspector General Isabel Cumming. The breach allowed cybercriminals to access a vendor’s account, alter bank account information, and redirect payments intended for city work.