Spyware Campaigns Targeting Messaging Apps: What IT Audit Teams Need to Know

CISA has issued a new warning about active spyware campaigns targeting messaging apps like Signal and WhatsApp. High-value users are being hit with device exploits, fake apps, and zero-click attacks. Here’s what organizations need to know — and how IT Audit Labs can help strengthen mobile and messaging security.
St. Paul Cyber Attack: Eric Brown Shares Expert Insights on FOX 9
Cybersecurity expert Eric Brown of IT Audit Labs joined FOX 9 to break down the recent St. Paul cyber attack, explaining how ransomware cripples city systems, the role of the National Guard’s cyber team, and steps individuals can take to protect their data. Learn the motives behind municipal cyber attacks, the high cost of recovery, and why ongoing cybersecurity investment is critical.
The Missing Piece in Digital Transformation

Digital transformation initiatives promise efficiency, innovation, and competitive advantage. Organizations invest heavily in new technologies, Agile frameworks, IT service management models, and process improvement methodologies in pursuit of modernization. Yet despite these investments, many organizations struggle to achieve meaningful results. If your organization has adopted new tools and frameworks but still experiences stalled initiatives, slow […]
Meet Pwnagotchi: The AI Pet That Hunts WiFi Handshakes

Discover Pwnagotchi, the AI-powered security tool that captures WiFi handshakes while learning and adapting over time. Part Tamagotchi, part hacker’s companion—this open-source device is redefining ethical network testing with personality and power.
Microsoft Vulnerabilities: How to Measure Progress With a Growing Code Base

How we got here In the early days of software development, security was an afterthought. Protocols like HTTP, FTP, and Telnet were created with little to no safeguards, leaving the internet—and its users—wide open to exploitation. Initially, attacks were driven by curiosity or notoriety: defacing web pages, crashing servers, and stealing unreleased content. But as […]
A Year With the Flipper Zero: What I’ve Learned [March 2024 Update]

After a year of hands-on testing, security engineer Cameron Birkland shares what he’s learned about the Flipper Zero—a powerful wireless hacking tool making waves in cybersecurity. From cloning garage remotes to launching BLE attacks, this guide explores Flipper Zero’s capabilities, firmware upgrades, accessories, and why it’s both a valuable learning device and a rising concern for physical security.
VPN Cybersecurity Risks and How to Stay Secure

VPNs are essential tools for online privacy, but they’re not without risks. In this blog, cybersecurity expert Nick Mellem breaks down how VPNs work, common pitfalls, and the best practices to keep your data secure—even when your VPN isn’t.
The Future of Digital Storage: From Hard Drives to DNA

In today’s digital world, storing data is more important than ever. We’ve come a long way—from punch cards and magnetic tapes to hard drives, flash drives, and cloud storage. But big changes are on the horizon. Evolving Hard Drives Hard disk drives (HDDs) still play a major role in data storage. They use magnetism to […]
Quantum Computing Made Simple: What You Need to Know

Quantum computing flips the switch on classical bits—using qubits that exist in multiple states simultaneously—to tackle problems at unprecedented speed. From accelerating drug discovery and powering next‑generation AI models to posing new challenges for today’s encryption, quantum tech is poised to redefine industries. In our chat with expert Bill Harris, we break down the fundamentals, explore real‑world applications, and discuss how innovators like IBM and leading nations are racing toward a quantum future.
The Dark Side of Cyberspace: Data Breaches and the Price of Information

In today’s hyperconnected world, keeping your personal data secure is more important than ever. In our recent episode of The Audit, we unpacked the hidden dangers of cyberspace—covering data breaches, privacy risks, and the rising tide of cyberattacks. Here’s a streamlined overview of the discussion, updated for today’s trends and packed with cybersecurity, data protection, […]