ĢTV

Glitch effectGlitch effectGlitch effect

ĢTV Blog

Welcome to the ĢTV Cybersecurity Blog, your go-to spot for staying ahead of hackers and boosting your cybersecurity savviness. Our blog contributors have focused on making cybersecurity education engaging and accessible for everyone.

ĢTV social logo

Threat Advisory: Oh No Cleo! Cleo Software Actively Being Exploited in the Wild

December 9, 2024
Glitch effectGlitch effectGlitch effect
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Akira Ransomware Indicators

Akira Ransomware Indicators

September 20, 2024
ReadText34 Ransomware Incident

ReadText34 Ransomware Incident

September 19, 2024
Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software

Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software

September 17, 2024
Are Biometrics the Unsung Hero or the Ultimate Villain in Cybersecurity?
No items found.

Are Biometrics the Unsung Hero or the Ultimate Villain in Cybersecurity?

September 15, 2024
Detecting Malicious Use of LOLBins

Detecting Malicious Use of LOLBins

September 11, 2024
Will Patients’ Data Ever Be Safe if We Let GPTs Into Healthcare?
No items found.

Will Patients’ Data Ever Be Safe if We Let GPTs Into Healthcare?

September 10, 2024
You’re the “Why” Behind the ĢTV Hub

You’re the “Why” Behind the ĢTV Hub

September 10, 2024
Chaos to Clarity: How Our Community Helped Transform SIEM

Chaos to Clarity: How Our Community Helped Transform SIEM

September 5, 2024
Phishing in the Fast Lane: The Attacker’s Eye View

Phishing in the Fast Lane: The Attacker’s Eye View

September 3, 2024
7 Benefits of Outsourcing Cybersecurity Services for Your Business

7 Benefits of Outsourcing Cybersecurity Services for Your Business

September 1, 2024
Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

Advanced Persistent Threat Targeting Vietnamese Human Rights Defenders

August 28, 2024
Which States Are Most at Risk for Cyberattacks on Government and Infrastructure?

Which States Are Most at Risk for Cyberattacks on Government and Infrastructure?

August 26, 2024
Remote Work Security: Follow Imani’s Journey in Our Latest ĢTV SAT Episode!

Remote Work Security: Follow Imani’s Journey in Our Latest ĢTV SAT Episode!

August 22, 2024
Unwanted Access: Protecting Against the Growing Threat of Session Hijacking and Credential Theft

Unwanted Access: Protecting Against the Growing Threat of Session Hijacking and Credential Theft

August 21, 2024
Don't Get Your Security from Your RMM Provider: The Risks You Should Know

Don't Get Your Security from Your RMM Provider: The Risks You Should Know

August 5, 2024
No items found.
Glitch effect

Sign Up for Blog Updates

Subscribe today and you’ll be the first to know when new content hits the blog.

By submitting this form, you accept our Privacy Policy
Oops! Something went wrong while submitting the form.
ĢTV at work