-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcybernews.html
427 lines (424 loc) · 24.1 KB
/
cybernews.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<title>Cybersecurity News & Trends - CTC Cybersecurity</title>
<meta name="description" content="Stay updated with the latest cybersecurity news, trends, and insights. Explore topics like ransomware, APT groups, cloud security, and more.">
<meta name="keywords" content="Cybersecurity News, Cyber Threats, Ransomware, APT Groups, Cloud Security, Zero Trust, Cybersecurity Updates">
<meta name="author" content="CTC Cybersecurity">
<meta name="robots" content="index, follow">
<link rel="canonical" href="https://ctccybersecurity.com/cybernews">
<link rel="stylesheet" href="https://fonts.googleapis.com/css2?family=Merriweather:wght@300;400;700&display=swap">
<link rel="stylesheet" href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css">
<link rel="stylesheet" href="css/style.css">
<script src="https://cdn.jsdelivr.net/npm/chart.js"></script>
</head>
<body>
<section class="header">
<nav>
<a href="/index.html"><img src="images/ctclogo69.png" alt="CTC Cybersecurity Logo"></a>
<div class="nav-links" id="navLinks">
<ul>
<li><a href="/index.html">Home</a></li>
<li><a href="/cybernews.html">Cybersecurity News</a></li>
<li><a href="/toolsandresources.html">Tools and Resources</a></li>
<li><a href="/cyberhygiene.html">Cyber Hygiene</a></li>
<li><a href="/contact.html">Contact Us</a></li>
</ul>
</div>
</nav>
<div class="headline">
<h2>Welcome to CTC Cybersecurity</h2>
<p>My goal is to provide cybersecurity resources<br>that will keep you better equipped to face evolving cyber threats!</p>
<a href="../portfolio.html" class="about-btn">Learn More About Me</a>
</div>
</section>
<!-- Current events section for topics to check out linked to google searching -->
<section class="current-events">
<h2>Current Events in Cybersecurity</h2>
<p>Stay updated with the latest developments, incidents, and major news stories from across the cybersecurity landscape.</p>
<div class="flex-container">
<div class="flex-box">
<h3>Global Ransomware Attack Surge</h3>
<p>Increased ransomware attacks are targeting critical infrastructure globally, prompting new defense strategies.</p>
<a href="https://google.com/search?q=global+ransomware+attack" target="_blank">Read More</a>
</div>
<div class="flex-box">
<h3>New Cybersecurity Guidelines by NIST</h3>
<p>The National Institute of Standards and Technology (NIST) has released updated guidelines for supply chain risk management.</p>
<a href="https://google.com/search?q=New+Cybersecurity+Guidelines+by+NIST" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>APT Group Targeting Financial Institutions</h3>
<p>Advanced persistent threat (APT) groups continue to target global financial institutions with highly sophisticated attacks.</p>
<a href="https://google.com/search?q=APT+group+targeting+financial+institutions" target="_blank">Read More</a>
</div>
<div class="flex-box">
<h3>Emerging Threats in Cloud Security</h3>
<p>With the growth of cloud adoption, new vulnerabilities and threats are surfacing, challenging security teams worldwide.</p>
<a href="https://google.com/search?q=emerging+threats+in+cloud+security" target="_blank">Learn More</a>
</div>
</div>
</section>
<!-- Top trending topics in cybersecurity section -->
<section class="trending-topics">
<h2>Trending Cybersecurity Topics</h2>
<p>These are some of the largest topics to date across the cybersecurity community.</p>
<div class="flex-container">
<div class="flex-box">
<h3>Supply Chain Attacks</h3>
<p>Cyber attackers are increasingly targeting supply chains, exploiting third-party vendors to breach large organizations.</p>
<a href="https://google.com/search?q=Supply+Chain+Attacks" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Zero Trust Architecture</h3>
<p>Zero Trust focuses on verifying every request as though it comes from an open network, increasing overall security.</p>
<a href="https://google.com/search?q=Zero+Trust+Architecture" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Advanced Persistent Threats (APT)</h3>
<p>APTs are continuous, stealthy, and sophisticated attacks targeting high-value data over a long-term period.</p>
<a href="https://google.com/search?q=Advanced+Persistent+Threats+(APT)" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Cloud Security Best Practices</h3>
<p>With cloud adoption growing, securing cloud infrastructure is critical to protect sensitive data and applications.</p>
<a href="https://google.com/search?q=Cloud+Security+Best+Practices" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Cybercrime Laws and Regulations</h3>
<p>Understanding cybersecurity laws and regulations helps businesses remain compliant and avoid legal issues.</p>
<a href="https://google.com/search?q=Cybercrime+Laws+and+Regulations" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>AI in Cybersecurity</h3>
<p>AI and machine learning are transforming how cybersecurity professionals detect and respond to threats in real-time.</p>
<a href="https://google.com/search?q=AI+in+Cybersecurity" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Phishing & Social Engineering</h3>
<p>Social engineering attacks, especially phishing, remain a top threat vector for enterprises worldwide.</p>
<a href="https://google.com/search?q=Phishing+and+Social+Engineering" target="_blank">Learn More</a>
</div>
<div class="flex-box">
<h3>Ransomware-as-a-Service (RaaS)</h3>
<p>RaaS has commoditized ransomware, enabling cybercriminals with limited skills to deploy effective ransomware attacks.</p>
<a href="https://google.com/search?q=Ransomware-as-a-Service+(RaaS)" target="_blank">Learn More</a>
</div>
</div>
</section>
<!-- Cyber news rss feed section see rssfeed.js for additional notes -->
<section class="rss-feeds">
<h2>Cybersecurity News & Updates</h2>
<div class="rss-carousel" id="rss-feed-1">
<h3>Stay Updated with CISA</h3>
<div class="carousel-container">
<div class="rss-content">
</div>
</div>
<div class="carousel-controls">
<button class="carousel-btn left" onclick="slideCarousel('rss-feed-1', 'prev')">◀</button>
<button class="carousel-btn right" onclick="slideCarousel('rss-feed-1', 'next')">▶</button>
</div>
</div>
<div class="rss-carousel" id="rss-feed-2">
<h3>Articles from Krebs on Security</h3>
<div class="carousel-container">
<div class="rss-content">
</div>
</div>
<div class="carousel-controls">
<button class="carousel-btn left" onclick="slideCarousel('rss-feed-2', 'prev')">◀</button>
<button class="carousel-btn right" onclick="slideCarousel('rss-feed-2', 'next')">▶</button>
</div>
</div>
<div class="rss-carousel" id="rss-feed-3">
<h3>Recorded Future News Feed</h3>
<div class="carousel-container">
<div class="rss-content">
</div>
</div>
<div class="carousel-controls">
<button class="carousel-btn left" onclick="slideCarousel('rss-feed-3', 'prev')">◀</button>
<button class="carousel-btn right" onclick="slideCarousel('rss-feed-3', 'next')">▶</button>
</div>
</div>
</section>
<!-- Cybersecurity stats section with italics for references -->
<section class="cyber-stats-section">
<div class="cyber-stats-container">
<h2><i class="fa fa-shield"></i> Key Cybersecurity Statistics</h2>
<div class="stats-grid">
<div class="stat">
<h3>Cybercrime Damage Costs</h3>
<p>Expected to reach <strong>$10.5 trillion annually</strong> by 2025.</p>
<p><em>Source: Cybersecurity Ventures</em></p>
</div>
<div class="stat">
<h3>Average Cost of a Data Breach</h3>
<p>As of 2023, the average data breach costs <strong>$4.24 million</strong>.</p>
<p><em>Source: IBM Cost of a Data Breach Report</em></p>
</div>
<div class="stat">
<h3>Ransomware Attacks</h3>
<p>Ransomware attacks are predicted to target a business every <strong>11 seconds</strong>.</p>
<p><em>Source: Cybersecurity Ventures</em></p>
</div>
<div class="stat">
<h3>Phishing Attacks</h3>
<p>Phishing accounts for <strong>90% of data breaches</strong>.</p>
<p><em>Source: Verizon Data Breach Investigations Report</em></p>
</div>
</div>
</div>
<div class="cyber-workforce-container">
<h2><i class="fa fa-users"></i> Cybersecurity Workforce Growth & Shortages</h2>
<div class="workforce-grid">
<div class="workforce-stat">
<h3>Cybersecurity Workforce Gap</h3>
<p>There is a global shortage of <strong>3.4 million cybersecurity professionals</strong> in 2023.</p>
<p><em>Source: (ISC)² Cybersecurity Workforce Study</em></p>
</div>
<div class="workforce-stat">
<h3>Workforce Growth</h3>
<p>The cybersecurity workforce has grown by <strong>10%</strong> over the past year, reaching <strong>4.7 million professionals</strong>.</p>
<p><em>Source: (ISC)² Cybersecurity Workforce Study</em></p>
</div>
<div class="workforce-stat">
<h3>Demand for Cybersecurity Professionals</h3>
<p>The demand for cybersecurity professionals is expected to grow by <strong>33%</strong> from 2023 to 2030.</p>
<p><em>Source: U.S. Bureau of Labor Statistics</em></p>
</div>
<div class="workforce-stat">
<h3>Average Salary</h3>
<p>The average salary for cybersecurity professionals is <strong>$119,000</strong> per year in the U.S.</p>
<p><em>Source: U.S. Bureau of Labor Statistics</em></p>
</div>
</div>
</div>
</section>
<!-- Cyber incidents and threat actor section (will need to figure out how to address the three charts somehow) -->
<section class="cyber-stats-chart">
<h2>Current Cybersecurity Landscape</h2>
<p>Stay updated with the most recent cyber incidents, their costs, and the key threat actors involved.</p>
<div class="cybercharts">
<!-- Cyber incidents chart with mock data -->
<div class="chart-container">
<h3>Total Cyber Incidents</h3>
<div class="charts">
<canvas id="cyberIncidentsChart"></canvas>
</div>
</div>
<script>
const ctxIncidents = document.getElementById('cyberIncidentsChart').getContext('2d');
const cyberIncidentsChart = new Chart(ctxIncidents, {
type: 'bar',
data: {
labels: ['January', 'February', 'March', 'April', 'May', 'June'], // Example Data
datasets: [{
label: 'Number of Incidents in 2024',
data: [500, 600, 800, 900, 950, 1100],
backgroundColor: 'rgba(0, 174, 239, 0.2)',
borderColor: '#00AEEF',
borderWidth: 2
}]
},
options: {
responsive: true,
scales: {
y: { beginAtZero: true }
}
}
});
</script>
<!-- Cost to business and individuals with mock data for now -->
<div class="chart-container">
<h3>Cost to Business & Individuals</h3>
<canvas id="cyberCostChart"></canvas>
</div>
<script>
const ctxCost = document.getElementById('cyberCostChart').getContext('2d');
const cyberCostChart = new Chart(ctxCost, {
type: 'bar',
data: {
labels: ['Business', 'Individuals'],
datasets: [{
label: 'Cost in Millions',
data: [1500, 600],
backgroundColor: ['#f44336', '#1D2B44'],
borderColor: ['#f44336', '#1D2B44'],
borderWidth: 1
}]
},
options: {
responsive: true,
scales: {
y: { beginAtZero: true }
}
}
});
</script>
<!-- Top ten threat actors semi correct but mostly made up for visual purposes -->
<div class="chart-container">
<h3>Top 10 Threat Actors</h3>
<canvas id="threatActorsChart"></canvas>
</div>
</div>
<script>
const ctxThreatActors = document.getElementById('threatActorsChart').getContext('2d');
const threatActorsChart = new Chart(ctxThreatActors, {
type: 'pie',
data: {
labels: ['APT28', 'FIN7', 'Lazarus Group', 'Cobalt Group', 'APT33', 'APT41', 'TA505', 'Charming Kitten', 'DarkSide', 'REvil'],
datasets: [{
label: 'Threat Actors',
data: [12, 10, 9, 8, 7, 6, 5, 5, 4, 4],
backgroundColor: [
'#f44336', '#1D2B44', '#00AEEF', '#FF9800', '#4CAF50',
'#673AB7', '#E91E63', '#9C27B0', '#FFEB3B', '#795548'
]
}]
},
options: {
responsive: true
}
});
window.onload = function () {
const ctx = document.getElementById('cyberIncidentsChart').getContext('2d');
new Chart(ctx, {
type: 'bar',
data: {
labels: ['January', 'February', 'March'],
datasets: [{
label: 'Test Data',
data: [10, 20, 30],
backgroundColor: 'rgba(255, 99, 132, 0.2)',
borderColor: 'rgba(255, 99, 132, 1)',
borderWidth: 1
}]
},
options: {
scales: {
y: {
beginAtZero: true
}
}
}
});
};
</script>
</section>
<!-- Search section to push search query to google -->
<section class="search">
<h2>Search for More Information</h2>
<p>Use the search tool to explore the web for more cybersecurity resources and news:</p>
<div class="form">
<form action="https://www.google.com/search" method="GET" target="_blank">
<input type="text" name="q" placeholder="Search for cybersecurity topics here..." required>
<button type="submit" class="searchbtn">Search</button>
</form>
</div>
</section>
<!-- Footer to be used across all pages -->
<footer>
<div class="footercontainer">
<div class="footerlogo">
<img src="images/ctclogo69.png" alt="CTC Cybersecurity Logo">
<h5>© 2024 CTC Cybersecurity<br>All Rights Reserved</h5>
</div>
<!-- Footer contact info (email, phone, address) -->
<div class="footercontact">
<h4>Contact Information</h4>
<p>Phone: 518-309-2163<br>Email: <a href="mailto:cody.tilley@ctccybersecurity.com">cody.tilley@ctccybersecurity.com</a></p>
<address>Mailing Address:<br>P.O. Box 119,<br>Voorheesville, NY 12186</address>
</div>
<!-- Quicklinks section for important pages -->
<div class="footernavigation">
<h4>Important Links</h4>
<ul>
<li><a href="/privacypolicy.html" target="_blank">Privacy Policy</a></li>
<li><a href="/cookiepolicy.html" target="_blank">Cookie Policy</a></li>
<li><a href="/termsandconditions.html" target="_blank">Terms & Conditions</a></li>
<li><a href="/contact.html" target="_blank">Contact Us</a></li>
</ul>
</div>
<!-- Footer social media contact resused from homework assignment -->
<div class="footersocialmedia">
<h4>Social Media</h4>
<a href="https://www.facebook.com/cta0930/" target="_blank">
<svg stroke="currentColor" fill="currentColor" stroke-width="0" viewBox="0 0 512 512" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg">
<path d="M504 256C504 119 393 8 256 8S8 119 8 256c0 123.78 90.69 226.38 209.25 245V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.28c-30.8 0-40.41 19.12-40.41 38.73V256h68.78l-11 71.69h-57.78V501C413.31 482.38 504 379.78 504 256z" />
</svg>
</a>
<br>
<a href="https://www.linkedin.com/in/ctilley0124/" target="_blank">
<svg stroke="currentColor" fill="currentColor" stroke-width="0" viewBox="0 0 448 512" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg">
<path d="M100.28 448H7.4V148.9h92.88zM53.79 108.1C24.09 108.1 0 83.5 0 53.8a53.79 53.79 0 0 1 107.58 0c0 29.7-24.1 54.3-53.79 54.3zM447.9 448h-92.68V302.4c0-34.7-.7-79.2-48.29-79.2-48.29 0-55.69 37.7-55.69 76.7V448h-92.78V148.9h89.08v40.8h1.3c12.4-23.5 42.69-48.3 87.88-48.3 94 0 111.28 61.9 111.28 142.3V448z"></path>
</svg>
</a>
<br>
<a href="/~https://github.com/cta0930" target="_blank">
<svg stroke="currentColor" fill="currentColor" stroke-width="0" viewBox="0 0 480 512" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg">
<path d="M186.1 328.7c0 20.9-10.9 55.1-36.7 55.1s-36.7-34.2-36.7-55.1 10.9-55.1 36.7-55.1 36.7 34.2 36.7 55.1zM480 278.2c0 31.9-3.2 65.7-17.5 95-37.9 76.6-142.1 74.8-216.7 74.8-75.8 0-186.2 2.7-225.6-74.8-14.6-29-20.2-63.1-20.2-95 0-41.9 13.9-81.5 41.5-113.6-5.2-15.8-7.7-32.4-7.7-48.8 0-21.5 4.9-32.3 14.6-51.8 45.3 0 74.3 9 108.8 36 29-6.9 58.8-10 88.7-10 27 0 54.2 2.9 80.4 9.2 34-26.7 63-35.2 107.8-35.2 9.8 19.5 14.6 30.3 14.6 51.8 0 16.4-2.6 32.7-7.7 48.2 27.5 32.4 39 72.3 39 114.2z"></path>
</svg>
</a>
<br>
<a href="https://discord.com/users/695969247825887243/" target="_blank">
<svg stroke="currentColor" fill="currentColor" stroke-width="0" viewBox="5 5 13 13" height="1em" width="1em" xmlns="http://www.w3.org/2000/svg">
<path d="M13.914 14.58a8.998 8.998 0 0 1-.484.104 7.06 7.06 0 0 1-2.664-.01c-.154-.03-.372-.083-.653-.158l-.921 1.197c-2.273-.073-3.137-1.596-3.137-1.596 0-3.381 1.481-6.122 1.481-6.122 1.481-1.133 2.89-1.102 2.89-1.102l.403.525a1.12 1.12 0 0 1 .112-.01 8.527 8.527 0 0 1 2.314.01l.442-.525s1.41-.031 2.89 1.103c0 0 1.482 2.74 1.482 6.121 0 0-.875 1.522-3.148 1.596l-1.007-1.134zM10.076 11C9.475 11 9 11.45 9 12s.485 1 1.076 1c.6 0 1.075-.45 1.075-1 .01-.55-.474-1-1.075-1zm3.848 0c-.6 0-1.075.45-1.075 1s.485 1 1.075 1c.601 0 1.076-.45 1.076-1s-.475-1-1.076-1z"></path>
</svg>
</a>
</div>
</div>
<!-- Footer banner for disclosure and legal use -->
<div class="footerbanner">
<p>
The content provided on this site, including recommendations, tools, and advice, is for informational and educational purposes only.
CTC Cybersecurity is not responsible for any direct, indirect, or consequential damages arising from the use or reliance on any of the tools or content provided on this site. By using this site, you agree to do so at your own risk. For more details, please review our <a href="/termsandconditions.html" target="_blank">Terms and Conditions.</a>
</p>
</div>
</footer>
<!-- Scroll to top function //fix the js for smooth scroll// -->
<a href="#top" class="scroll-to-top" id="scrollToTopBtn">
⇧
</a>
<script src="js/rssfeed.js"></script>
<script src="js/script.js"></script>
<script type="application/ld+json">
{
"@context": "https://schema.org",
"@type": "WebPage",
"name": "Cybersecurity News & Trends",
"url": "https://ctccybersecurity.com/cybernews",
"description": "Stay updated with the latest cybersecurity news, trends, and insights. Explore topics like ransomware, APT groups, cloud security, and more.",
"publisher": {
"@type": "Organization",
"name": "CTC Cybersecurity",
"url": "https://ctccybersecurity.com",
"logo": {
"@type": "ImageObject",
"url": "https://ctccybersecurity.com/images/ctclogo69.png"
}
},
"breadcrumb": {
"@type": "BreadcrumbList",
"itemListElement": [
{
"@type": "ListItem",
"position": 1,
"name": "Home",
"item": "https://ctccybersecurity.com/index.html"
},
{
"@type": "ListItem",
"position": 2,
"name": "Cybersecurity News",
"item": "https://ctccybersecurity.com/cybernews"
}
]
}
}
</script>
</body>
</html>