TechGuard Blog

Adam Voss

Adam Voss
Adam Voss graduated from Maryville University with an emphasis on pen-testing. Currently, he works at TechGuard as a cybersecurity analyst. When he's not working on projects or expanding his knowledge in the field to get his certs, he can be found doing something that involves physical exercise or rooting for the cardinals or blues.

Recent Posts

Microsoft Protocol Update

Attention all Microsoft users, there were two significant updates this week that will bring you some joy, and maybe even some relief! For those who don’t know, Microsoft announced there would be an update for the Microsoft MSIX protocol that will...

Recommendations for the Log4j Vulnerability

A remote code Execution has been detected in the wild, known as the Log4j Vulnerability. This vulnerability allows an attacker to have the potential to carry out remote code execution on Java-based apps using Log4j or webservers with Apache Log4j.

CCPA Compliance and What This Means for You

On June 28th, 2018, California signed a new law called the California consumer privacy act (CCPA), which went into effect on January 1st, 2020. On July 1st, 2020 this law went into its enforcement phase. What this entails is that California's Attorney...

Newest Player in the Ransomware Game, Netwalker, Targets Universities

Over the past few weeks, there have been attacks carried out against universities in the united states where the attackers have been successful in stealing unencrypted data and then encrypting the university computers for ransom. The data taken from...

Back to the Basics: Security 101

Over the past few months, there has been much talk about COVID-19 and what it means for businesses with employees working from home. Today, I thought I would change it up and get back to the basics of cybersecurity to talk about a type of attack that is...

Upping the Scale

COVID-19 phishing attempts have run rampant in cyber news since so many employees were ordered to work from home during the outbreak. When a company has to suddenly transition its users to work remotely, their network's threat landscape grows...

Phishing in the BlackWater

With the workforce transitioning to a work-from-home workforce, cybersecurity attackers have begun to change their approach on how to attack users. While phishing has always been a method of attack for cybercriminals, the transition to WFH has given...




Read More Articles →