<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/">

<channel>
	<title>US ProTech, Inc.</title>
	<atom:link href="https://www.usprotech.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.usprotech.com/</link>
	<description>Business Technology Solutions</description>
	<lastBuildDate>Thu, 26 Mar 2026 16:45:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.3.8</generator>
	<item>
		<title>Maritime Cybersecurity, Risk, and the Threat Landscape</title>
		<link>https://www.usprotech.com/maritime-cybersecurity-risk-and-the-threat-landscape/</link>
					<comments>https://www.usprotech.com/maritime-cybersecurity-risk-and-the-threat-landscape/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Thu, 12 Mar 2026 17:27:23 +0000</pubDate>
				<category><![CDATA[CDM]]></category>
		<category><![CDATA[Continuous Diagnostics & Mitigation]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5465</guid>

					<description><![CDATA[<p>OT systems, which govern essential shipboard functions such as navigation, propulsion, and cargo handling, remain a major focus for attackers. Many of these systems rely on outdated software and lack modern cybersecurity measures, making them highly susceptible to breaches. Additionally, the growing interconnectivity of IT and OT systems introduces cascading risks, where a single breach can disrupt both operational and digital environments.</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/maritime-cybersecurity-risk-and-the-threat-landscape/">Maritime Cybersecurity, Risk, and the Threat Landscape</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>Global Operational Technology (OT) Vulnerabilities:</h3>
<p>OT systems, which govern essential shipboard functions such as navigation, propulsion, and cargo handling, remain a major focus for attackers. Many of these systems rely on outdated software and lack modern cybersecurity measures, making them highly susceptible to breaches. Additionally, the growing interconnectivity of IT and OT systems introduces cascading risks, where a single breach can disrupt both operational and digital environments. Direct attacks on OT systems could result in vessel immobilization,navigational failures, or safety incidents, making the security of these systems a top priority.</p>
<p style="text-align: center;"><a href='https://www.usprotech.com/files/2026/02/2026-USPT-Blog-Maritime-Cybersecurity-Risk-and-the-Threat-Landscape-Ver-02-02.pdf' class='big-button biggreen' target="_blank">Click Here to Read More</a></p>
<p>&nbsp;</p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/maritime-cybersecurity-risk-and-the-threat-landscape/">Maritime Cybersecurity, Risk, and the Threat Landscape</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/maritime-cybersecurity-risk-and-the-threat-landscape/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>2026 Cybersecurity Subcommittee for Critical Infrastructure: Ports of Los Angeles and Long Beach, California  &#124;  SME Membership Extended</title>
		<link>https://www.usprotech.com/2026-cybersecurity-subcommittee-for-critical-infrastructure-ports-of-los-angeles-and-long-beach-california-sme-membership-extended/</link>
					<comments>https://www.usprotech.com/2026-cybersecurity-subcommittee-for-critical-infrastructure-ports-of-los-angeles-and-long-beach-california-sme-membership-extended/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 07:15:31 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Critical infrastructure]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[SME Membership]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5454</guid>

					<description><![CDATA[<p>“Managing the Cybersecurity of the largest Ports Critical Infrastructure in America is no small matter” stated Goetsch. Membership to the Ports Cybersecurity Subcommittee for the protection of Critical Infrastructure is intentionally kept to a small group of legislators and subject matter experts (SME’s) and Federal staff members from the CISA, DHS, the FBI, Port Authorities, and key Port tenants. The So-Cal based Subcommittee focusses on the smooth, safe and secure delivery of what is essential to the daily operations in Southern California.</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/2026-cybersecurity-subcommittee-for-critical-infrastructure-ports-of-los-angeles-and-long-beach-california-sme-membership-extended/">2026 Cybersecurity Subcommittee for Critical Infrastructure: Ports of Los Angeles and Long Beach, California  |  SME Membership Extended</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h5><span style="font-weight: 400;">U.S. Coast Guard’s Cybersecurity Subcommittee for Critical Infrastructure Extends Continued Membership to Jonathan Goetsch, Founder of </span><span style="text-decoration: underline;"><a href="https://usprotech.com/"><span style="font-weight: 400;"><span style="color: #ff0000; text-decoration: underline;">US</span> <span style="color: #ff0000; text-decoration: underline;">ProTech</span></span></a></span><span style="font-weight: 400;"> (MSP) and </span><span style="text-decoration: underline;"><a href="https://anamo.io/"><span style="font-weight: 400;"><span style="color: #ff0000; text-decoration: underline;">Anamo</span>.<span style="color: #ff0000; text-decoration: underline;">io</span></span></a></span><span style="font-weight: 400;"> (CDM-SIEM).</span></h5>
<p><span style="font-weight: 400;">“Managing the Cybersecurity of the largest Ports Critical Infrastructure in America is no small matter” stated </span><span style="text-decoration: underline; color: #ff0000;"><a style="color: #ff0000;" href="https://www.linkedin.com/in/jonathan-goetsch/"><span style="font-weight: 400;">Goetsch</span></a></span><span style="font-weight: 400;"><span style="color: #ff0000;">.</span> Membership to the Ports Cybersecurity Subcommittee for the protection of Critical Infrastructure is intentionally kept to a small group of legislators and subject matter experts (SME’s) and </span><span style="text-decoration: underline; color: #ff0000;"><a style="color: #ff0000;" href="https://homeland.house.gov/cybersecurity-infrastructure-protection-and-innovation/"><span style="font-weight: 400;">Federal</span></a></span><span style="font-weight: 400;"> staff members from the CISA, DHS, the FBI, Port Authorities, and key Port tenants. The So-Cal based Subcommittee focusses on the smooth, safe and secure delivery of what is essential to the daily operations in Southern California.  Some members operate principal hubs of distribution for petroleum and manufactured products that you and rely upon every single day.  But what happens when the Supply Chain get interrupted and what causes those interruptions to being with? The Subcommittee is dedicated do preserving our way of life and it takes a small army of professionals to achieve the stated objective.</span></p>
<p><span style="font-weight: 400;">Not all welcome technology:  While modern technology in Port operations has already arrived, the fact is that some </span><span style="text-decoration: underline;"><a href="https://www.city-journal.org/article/international-longshoremens-association-dockworkers-ports-trade-technology-unions"><span style="font-weight: 400;"><span style="color: #ff0000; text-decoration: underline;">l</span><span style="color: #ff0000; text-decoration: underline;">abor unions remain opposed</span></span></a></span><span style="font-weight: 400;"> due fears of losing total control.  Over the course of the coming year, Goetsch and his team of Cybersecurity experts, along with other SME’s and Federal Port staff will continue the introduction of advance technologies while working with labor who will benefit from such advancement in Port operations.  Stay tuned, US ProTech will continue to deliver “Cleared” information in the coming year to keep our readers up to date with the latest news affecting Port operations.</span></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/2026-cybersecurity-subcommittee-for-critical-infrastructure-ports-of-los-angeles-and-long-beach-california-sme-membership-extended/">2026 Cybersecurity Subcommittee for Critical Infrastructure: Ports of Los Angeles and Long Beach, California  |  SME Membership Extended</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/2026-cybersecurity-subcommittee-for-critical-infrastructure-ports-of-los-angeles-and-long-beach-california-sme-membership-extended/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/11/port-1024x576.jpg" type="image/jpeg" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[port]]></media:description>
		</media:content>	</item>
		<item>
		<title>Welcome to the First Fall Edition of 2025:  US ProTech Cybersecurity Vulnerability Newsletter</title>
		<link>https://www.usprotech.com/welcome-to-the-first-fall-edition-of-2025-us-protech-cybersecurity-vulnerability-newsletter/</link>
					<comments>https://www.usprotech.com/welcome-to-the-first-fall-edition-of-2025-us-protech-cybersecurity-vulnerability-newsletter/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Fri, 14 Nov 2025 06:37:22 +0000</pubDate>
				<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[Critical Vulnerabilities]]></category>
		<category><![CDATA[vulnerability Trends]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5445</guid>

					<description><![CDATA[<p>Dear Cyber Professional and Team Member: &#160; October and November 2025 marked another critical and active period in the vulnerability landscape, with over 3,700 new CVEs published and 5,200 modified entries as critical flaws surged across software, hardware, and cloud platforms. US ProTech tracked 31,550 vulnerabilities year-to-date, expanded a correlated threat database containing 1,130 new [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/welcome-to-the-first-fall-edition-of-2025-us-protech-cybersecurity-vulnerability-newsletter/">Welcome to the First Fall Edition of 2025:  US ProTech Cybersecurity Vulnerability Newsletter</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3><span style="font-weight: 400;">Dear Cyber Professional and Team Member:</span></h3>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">October and November 2025 marked another critical and active period in the vulnerability landscape, with over 3,700 new CVEs published and 5,200 modified entries as critical flaws surged across software, hardware, and cloud platforms. US ProTech tracked 31,550 vulnerabilities year-to-date, expanded a correlated threat database containing 1,130 new CVSS v4 and EPSS v4 scores vulnerabilities, and recorded over 2.58 million vendor patch advisories. Exploitation risk remained high, with 408 critical CVEs (of which 13 rated 10) spanning </span><b>Redis, Flowise, Cisco Firewalls, Microsoft Windows, </b><span style="font-weight: 400;">and</span><b> WordPress</b><span style="font-weight: 400;"> plugins. Cloud-based SSRF and RCE vulnerabilities underscored growing multi-platform attack surface patterns, while WordPress plugin exploits highlighted ongoing supply-chain exposure. Top weaknesses were dominated by code injection (CWE-74), buffer overflows (CWE-119), and SQL injection (CWE-89), confirming attackers’ focus on input-validation and memory-handling flaws.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">US ProTech on Fall Vulnerability Trends<br />
</span></h3>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Cybersecurity threats continued to burden security professionals, vulnerability analysts and incident responders with specific patterns of exploitable, impactful vulnerabilities and a flurry of increased severities, and widespread across hardware, software, and cloud. The month saw a significant spike accounting of published vulnerabilities to about 3703 during the month, as compared to 3,738 in September and 3,360 in August. This Fall presented the most active month in the vulnerability landscape with a large portion of CVEs updated with newer risk score updates and advisories. US ProTech correlated and archived 31,550 published vulnerabilities so far during the year 2025, well on track to be one of the highest recorded in recent years. The number of modified vulnerabilities accounted for about 5,234 in October alone compared to 5,010 in September and 4,350 with modified risks, priorities, advisories during the month of August. A record 820 vulnerabilities published in August 2025 were revised in September. During the prior 2024 year, October only saw about 3,076 modified CVEs had their risk scores, advisories, and priorities revised, making the current month one of the most active seasons.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">US ProTech vendor patch advisories exceeded 2.58M, led by sources including </span><b>Suse, Ubuntu, Debian, Oracle, and Windows,</b><span style="font-weight: 400;"> accounting for nearly 76% of patched advisories issued during the month. US ProTech has consolidated and kept track of nearly 792K affected just in the last 5 years, one of the significant counts.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">US ProTech vulnerability data feeds have continued to embrace NVD 2.0 schema for correlating and maintaining our threat intel feeds. Our feed database continues to build upon CVSS4 and EPSS4 risk scoring metrics as part of our threat intel feed, and so far we recorded 9,785 risk scores in 2025 alone, the largest we have seen so far in any year. The first half of Fall accounted for about 1,130 CVSS4 scores aggregated. Specifically, about 71 of those are determined to be critical vulnerabilities of which 23 also have a “higher exploitability percentiles” greater than 60%. A higher EPSS percentile score indicates the likelihood of being exploited in the wild soon in the coming months compared to other similar vulnerabilities in the platform.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Vulnerability Landscape</span></h3>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">US ProTech has kept track of nearly 88K exploits so far with exploits, </span><b>github,</b> <b>metasploit, </b><span style="font-weight: 400;">and </span><b>packetstorm</b><span style="font-weight: 400;"> accounting for a large portion of identified counts.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">The number of critical vulnerabilities identified by US ProTech – those with a critical score of 9.0 or higher continued to rise significantly to 408 in October compared to 454 in the previous month. Among those critical vulnerabilities, about 43 of them (~ 10%) had a high likelihood of exploitations in the next few months with a probability of more than 50%. </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Among those, 13 critical ones (~ 3%) had a perfect 10.0 score observed in several hardware and software drivers and components. Particularly, an </span><b>SQL Injection</b><span style="font-weight: 400;"> vulnerability in </span><b>Esri ArcGIS Server</b><span style="font-weight: 400;"> (CVE-2025-57870) identified across </span><b>Windows, Linux, </b><span style="font-weight: 400;">and</span><b> Kubernetes</b><span style="font-weight: 400;"> platforms causing unauthenticated users to execute arbitrary SQL commands via specific feature operation; embedded web server missing authentication enabling remote attackers to access and modify device configurations with ABB ALS-mini-S4 and ALS-mini-S8 IP load controllers (CVE-2025-9574); unrestricted IP address vulnerability in </span><b>ProductivityService</b><span style="font-weight: 400;"> PLC Simulator allowing attackers to access or manipulate simulation parameters from any device on the network (CVE-2025-61934).</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">On the cloud front, </span><b>Server-Side Request Forgery</b><span style="font-weight: 400;"> (SSRF) vulnerability affects </span><b>Microsoft Azure</b><span style="font-weight: 400;"> Compute Gallery (CVE-2025-59503) where an authorized attacker could exploit this flaw to elevate privileges over a network. The current exploitation risk is high (about 25%), requiring minimal attack and network complexity and only basic privileges, making it easier for attackers to leverage.</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Platform Impacts</span></h3>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">In October, a series of critical exploitable vulnerabilities affected platforms such as </span><b>Redis, MLflow, WordPress, Flowise, and Windows, </b><span style="font-weight: 400;">and </span><b>WordPress</b><span style="font-weight: 400;"> plugins with attackers actively targeting these systems for remote code execution, command injection and privilege escalation.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">A series of WordPress plugin-based ecosystems are being targeted this Fall, underscoring a need for better plugin validation patch management.​ Specifically, plugins related to supply chain and open-source business platforms saw increased targeting, as attackers favored platforms with broader deployments for initial access and lateral movement attacks.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">A particular Redis in-memory open source vulnerability (CVE-2025-46817) allowed authenticated users to send crafted scripts corrupted memory and the stack, potentially leading to RCE. Redis developers are urged to immediately upgrade or block Lua script execution for untrusted accounts.</span></p>
<p>&nbsp;</p>
<p><b>Flowise</b><span style="font-weight: 400;">, an open-source low-code user interface platform for building customized large language model workflows, was hit by multiple critical remote code execution vulnerabilities related to insecure dependency handling and flaws in its plugin architecture. Two notable ones in October, CVE-2025-34267 and CVE-2025-61913, stemmed from improper validation of JavaScript code connections to the model context protocol (MCP) server, allowing remote attackers to execute arbitrary code on affected systems.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Two </span><b>Cisco Secure Firewall Adaptive Security Appliance (ASA) </b><span style="font-weight: 400;">and</span><b> Software </b><span style="font-weight: 400;">and</span><b> Cisco Secure Firewall Threat Defense (FTD) VPN Web server Software vulnerabilities</b><span style="font-weight: 400;"> (CVE-2025-20333, CVE-2025-20362) were identified in October, which allows authenticated, remote attacker to execute arbitrary code on an affected device caused due to improper validation of input in HTTP requests.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">WordPress plugins recorded a larger number of exploitable vulnerabilities, accounting for nearly 326 of vulnerabilities published in October alone, way more than in September. Of those 26 (~ 8%) are deemed critical, with about 8 having a high degree of exploitability of greater than 50% likelihood in the coming months. CVE-2025-7526 and CVE-2025-7634 were caused by </span><b>WP Travel Engine plugin</b><span style="font-weight: 400;">, used by over 20,000 WordPress sites in the travel sector, caused by arbitrary file deletion vulnerability caused by insufficient file path and allowing unauthenticated attackers to perform local file inclusion respectively. </span><b>WooCommerce Designer Plugin</b><span style="font-weight: 400;"> CVE-2025-6439 allows unauthenticated users to delete any files on the server, potentially causing RCE or data losses. A handful of WordPress CVE-2025-7721, CVE-2025-9485, CVE-2025-10294, CVE-2025-9209, CVE-2025-6388 relate to various WordPress plugins and themes reported causing issues like privilege escalation, authentication bypass, and arbitrary file upload leading to remote code execution. In general, it appeared like attacks favoring unauthenticated file deletions or inclusion type attacks, and targeting RCE compromise without requiring prior logins.</span></p>
<p>&nbsp;</p>
<p><b>Microsoft</b><span style="font-weight: 400;"> accounted for about 52 published known vulnerabilities in the month. Of which, 3 were reported to be high scores and had high exploitability including CVE-2025-24990, CVE-2025-59237, CVE-2025-59501. A critical privilege elevation flaw in the Windows Agere Modem Driver (CVE-2025-24990) present in supported Windows versions up to Server 2025 flaw resulting from legacy driver code removed rather than patched. This vulnerability allows attackers to gain local admin access even if the modem hardware is inactive, making it a widespread and serious threat. Two other critical vulnerabilities such as CVE-2025-59237 and CVE-2025-59501 broadly fit the pattern of RCE and privilege escalation in Windows services and components, emphasizing the critical need for immediate patch installation. CVE-2025-59237 is significant with about 69% EPSS percentile, and potentially active exploits available, demonstrating high risk for enterprise environments. A potential </span><b>Microsoft Edge</b><span style="font-weight: 400;"> (Chromium-based) flaw is known to execute arbitrary code remotely by exploiting weaknesses in Edge&#8217;s security controls. CVE-2025-60711 is a protection mechanism failure vulnerability that seems to have prevented unauthorized code execution from being bypassed or failing to work properly.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">On the advisory side, Microsoft&#8217;s October 2025 Patch Tuesday reported nearly 175-193 vulnerabilities, including 7-9 critical and over 150 important flaws across </span><b>Windows, Office, Windows Server Update Services (WSUS), graphics components, device drivers, </b><span style="font-weight: 400;">and</span><b> Microsoft Edge</b><span style="font-weight: 400;">. Fixes for 6 zero-day vulnerabilities, of which 4 are exploited in the wild. Exploitation trends primarily targeted RCE (about 30), privilege elevation (about 80), and information disclosures (about 28).</span></p>
<p>&nbsp;</p>
<h3><span style="font-weight: 400;">Top Weaknesses</span></h3>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">US ProTech identified several top weaknesses (CWE) that contributed to critical vulnerabilities during the month. Of the 408 critical vulnerabilities correlated in October alone, 89 (~ 22%) were CWE-74 Improper Neutralization injection weakness types, followed by 76 (~ 18%) CWE-119 Improper Restriction of Operations or buffer overflow, and 28 (~ 7%) CWE-89 SQL Injection weakness types. The trend seems to have a higher bias towards buffer overflow pattern of attacks during the month when compared to September.</span></p>
<p>&nbsp;</p>
<h3><b>Recent Critical Vulnerabilities – Fall 2025</b></h3>
<p><span style="font-weight: 400;">US ProTech suggests that you pay attention to these top critical vulnerabilities that are likely exploitable this month.</span></p>
<p><a href="https://www.usprotech.com/files/2025/11/Vulnerability.pdf"><img decoding="async" class="aligncenter wp-image-5451 size-medium" src="https://www.usprotech.com/files/2025/11/Screenshot-2025-11-13-10.57.19-PM-300x221.png" alt="" width="300" height="221" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><span style="text-align: center;">Living in times of change does not mean life changes to the time at hand.</span></p>
<p style="text-align: center;"><span style="font-weight: 400;">Hold Your Ground!</span></p>
<p style="text-align: center;"><span style="font-weight: 400;">If you want more info about how CDM-SIEM has impacted Host-Based IT Systems and Air Gapped OT Systems, </span></p>
<p style="text-align: center;"><span style="font-weight: 400;">Anamo’s patented technology has you covered!</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">The Anamo Agent is a Host-Based CDM-SIEM which autonomously interrogates a wide variety of systems internally. The reason that this is important is because all other SIEM products and services are external to the Host and network-based which leaves then “Blind” to essential forensics and the ability stop “Unauthorized Privileges Account Escalation” which is proven to be the #1 Data exfiltration Cybersecurity risk.</span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Below: An “always-on” Risk Assessments of every System, Software, User, Group, Port, Permission, Transaction, and more…. Conducted continuously, without data entry, scheduling, or activation.  Imagine that….  the work is done for you and the Platform never sleeps, takes brakes, get sick or runs off on vacation.  Now you can get the facts, see the results of CDM, and find time to do what every IT executive must do…. The other 1,000 tasks which await us all!</span></p>
<p><a href="https://www.usprotech.com/files/2025/10/unnamed1.jpg"><img decoding="async" loading="lazy" class="size-medium wp-image-5441 aligncenter" src="https://www.usprotech.com/files/2025/10/unnamed1-300x142.jpg" alt="" width="300" height="142" /></a></p>
<p style="text-align: center;"><i><span style="font-weight: 400;">Contact US ProTech about Anamo today to get your own extended free trial.</span></i></p>
<p style="text-align: center;"><i><span style="font-weight: 400;">The fact is… the smartest organizations have already taken the step towards gaining a real understanding of Risk and Behavioral analytics with Anamo’s patented technology and its ability to correlate data that’s never been harnessed before, until today!</span></i></p>
<p style="text-align: center;"><a href="http://www.anamo.io"><i><span style="font-weight: 400;">www.Anamo.io</span></i></a></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/welcome-to-the-first-fall-edition-of-2025-us-protech-cybersecurity-vulnerability-newsletter/">Welcome to the First Fall Edition of 2025:  US ProTech Cybersecurity Vulnerability Newsletter</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/welcome-to-the-first-fall-edition-of-2025-us-protech-cybersecurity-vulnerability-newsletter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Compare SIEM Solutions: ANAMO vs. Splunk</title>
		<link>https://www.usprotech.com/compare-siem-solutions-anamo-vs-splunk/</link>
					<comments>https://www.usprotech.com/compare-siem-solutions-anamo-vs-splunk/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Wed, 15 Oct 2025 05:55:05 +0000</pubDate>
				<category><![CDATA[Continuous Diagnostics & Mitigation]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[Anamo]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[Splunk]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5439</guid>

					<description><![CDATA[<p>Security Incident Event Management (SIEM) is a saturated industry with over 30 notable businesses specializing in the correlation of Cybersecurity threat analytics, but only one of those companies focus on Host-Based devices rather than Network-Based events. The problem for industry is insatiable rise of Hackers and that they have proven that they are skilled as they continuously usurp the current “Tech-Stack” of modern Cybersecurity tools, services, and protections, used by Mid-Market Corporations and Enterprises today. </p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/compare-siem-solutions-anamo-vs-splunk/">Compare SIEM Solutions: ANAMO vs. Splunk</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1 style="text-align: center;"><b>Internal SIEM vs. External SIEM</b></h1>
<h1 style="text-align: center;"><b>Understanding Host-Based Vs. Network Based Cybersecurity Threats</b></h1>
<p><span style="font-weight: 400;">Security Incident Event Management (SIEM) is a saturated industry with over 30 notable businesses specializing in the correlation of Cybersecurity threat analytics, but only one of those companies focus on Host-Based devices rather than Network-Based events. The problem for industry is insatiable rise of Hackers and that they have proven that they are skilled as they continuously usurp the current “Tech-Stack” of modern Cybersecurity tools, services, and protections, used by Mid-Market Corporations and Enterprises today. </span></p>
<p><span style="font-weight: 400;">Proof is everywhere and everyone has heard about breaches where technical adversaries have gained </span><b>“UNAUTHORIZED PRIVILEGED ACCOUNT ESCALATION,” </b><span style="font-weight: 400;">but the public generally learns of these breaches after they have been publicly disclosed. These types of headlines happen everywhere and are far too frequent for anyone to feel cyber-safe or comfortable. But what if there was an actual process for stopping hackers in One-Move, which was based upon objective-based events and forensic artifacts?</span></p>
<h3><b>Compare SIEM Solutions: Host-Based ANAMO CDM vs. System-Based Splunk</b></h3>
<p><span style="font-weight: 400;">ANAMO CDM is a highly specialized, host-based Continuous Diagnostics and Mitigation (CDM) platform that uses advanced comparative HashID Analytics which continuously identifies a broad range of forensic evidence in near real-time to deliver its version of SIEM.  Splunk is a broad, system-agnostic SIEM solution requiring the mass collection of logs and highly curated rules to subjectively identify anomalous behaviors. The primary difference lies in their scope: ANAMO focuses internally on deep, real-time analysis of individual host risks and vulnerabilities over Operation Technology (OT) and Internet Technology (IT) devices, whereas Splunk collects and correlates network-based which amount to volumes of comprehensive log data from across the entire system or enterprise. To simplify, the following breakdown highlights the most obvious attributes of both, of course other remain.</span></p>
<table>
<tbody>
<tr>
<td style="text-align: center;">
<h5><b>Products </b></h5>
</td>
<td style="text-align: center;">
<h5><b>ANAMO</b></h5>
</td>
<td style="text-align: center;">
<h5><b>Splunk</b></h5>
</td>
</tr>
<tr>
<td><span style="font-weight: 400;">Primary Focus</span></td>
<td><span style="font-weight: 400;">Deep, host-level internal-system monitoring, risk assessment, eDiscovery, mitigation, and reporting designed to eliminate Unauthorized Privileged Account Escalation and CVE mitigation.</span></td>
<td><span style="font-weight: 400;">Broad, enterprise-wide external-system security monitoring, data analysis, and reporting designed for data archival and parsing of Logs to identify  standard parameters and inconsistencies of rule-based security risks.</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Data Collection</span></td>
<td><span style="font-weight: 400;">&#8220;Log-less&#8221; agent-based data collection harnesses Comparative HashID analytics for continuous risk assessment of transactions, users, ports, permissions, and software vulnerabilities to the Kernel level.</span></td>
<td><span style="font-weight: 400;">Gathers and indexes machine-generated data Logs from virtually any source, including firewalls, servers, applications, and endpoints.</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Key Capability</span></td>
<td><span style="font-weight: 400;">Visualizing Real-time identification of adversary activities, Indicators or Attack (IoA’s), zero-day exploits, and system modifications on endpoints using autonomous machine learning.</span></td>
<td><span style="font-weight: 400;">Uses its Search Processing Language (SPL) and machine learning for searching, analyzing, and visualizing large volumes of data.</span></p>
<p><span style="font-weight: 400;">Provides clarity to Indicators of Compromise (IoC’s)</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Alerting</span></td>
<td><span style="font-weight: 400;">No-Delay real-time alerts on suspicious activities such as unauthorized changes or pivots on a host.</span></td>
<td><span style="font-weight: 400;">Creates alerts based on scheduled searches and predefined rules, which may introduce delays compared to ANAMO&#8217;s real-time capabilities.</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Architecture</span></td>
<td><span style="font-weight: 400;">A patent-pending CDM platform that delivers deep, host-centric visibility without log parsing or need for massive storage, offered as a SaaS product or licensing agreement.</span></td>
<td><span style="font-weight: 400;">A scalable data platform with a forwarder/indexer/search head architecture for on-premises, cloud, or hybrid deployment.</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Strengths</span></td>
<td><span style="font-weight: 400;">Low cost and complexity for deployment</span></p>
<p><span style="font-weight: 400;">Used with IT or OT Devices, on Windows or Linux OS’s, it continuously interrogates systems  autonomous to eliminate the Dwell-time of an adversary. </span></p>
<p><span style="font-weight: 400;">Delivers deep internal host insights. Tracks and correlates users, permissions, ports, as well as software (CVE) vulnerabilities at the host or enterprise level.</span></p>
<p><span style="font-weight: 400;">Proactive threat hunting: Identifies bad actors and insider threats by monitoring and reporting upon unusual and nuanced endpoint activity.</span></p>
<p><span style="font-weight: 400;">Database of forensic artifacts</span></td>
<td><span style="font-weight: 400;">Enterprise-scale visibility: Provides a centralized view of security events across an entire IT infrastructure.</span></p>
<p><span style="font-weight: 400;">Broad integration: Flexible platform with numerous apps and add-ons for data ingestion and integration.</span></p>
<p><span style="font-weight: 400;">Ability to add, change or delete log parsing rules </span></p>
<p><span style="font-weight: 400;">Centralized log repository</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Limitations</span></td>
<td><span style="font-weight: 400;">Limited systemic view: Less focused on correlating events across the entire network or from external data sources.</span></p>
<p><span style="font-weight: 400;">Does not monitor outside of the Host</span></td>
<td><span style="font-weight: 400;">High cost and complexity: Can be expensive and resource-intensive to deploy and manage at enterprise scale.</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">Delayed alerts: Can have potential visibility gaps for fast-moving threats due to its reliance on scheduled searches.</span></p>
<p><span style="font-weight: 400;">Does not monitor inside the Host</span></td>
</tr>
<tr>
<td><span style="font-weight: 400;">Compliance</span></td>
<td><span style="font-weight: 400;">Enhances Zero Trust Architecture (ZTA) and supports federal compliance, including CMMC, NIST 800 and HIPAA.</span></td>
<td><span style="font-weight: 400;">Used widely for compliance reporting across various industries due to its extensive data aggregation and reporting capabilities.</span></td>
</tr>
</tbody>
</table>
<h3><b>Which is right for your needs?</b></h3>
<p><span style="font-weight: 400;">Your choice between ANAMO CDM and Splunk depends on your organization&#8217;s security technical capabilities, posture, goals, and budget.</span></p>
<p><span style="font-weight: 400;">Choose ANAMO if:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You seek rapid identification of internal host-based threats based upon objective facts from forensic artifacts in near real-time</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You need to focus on deep, real-time monitoring and mitigation of threats across Operational Technology (OT) and Internet Technologies (IT) specifically at the host level across Open-Systems and Operating Systems such as Linux or Windows.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your priority is to proactively identify insider threats, target file paths, zero-day exploits, and lateral movement by malicious actors within endpoints.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your environment requires an easily managed SIEM which is financially affordable, offers strong Cybersecurity capabilities, and can also achieve advance security and monitoring requirements for compliance with federal frameworks like NIST. </span></li>
</ul>
<p><span style="font-weight: 400;">Choose Splunk if:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">You need a centralized platform to collect logs and analyze machine data from a wide variety of sources across a large, complex IT environment.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your security operations require the collection of logs or correlating logs from network devices, servers, and applications to get an enterprise-wide view of security events.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Your organization needs flexible data management and powerful search capabilities for both security and operational intelligence use cases. </span></li>
</ul>
<p><span style="font-weight: 400;">In many cases, organizations choose to integrate specialized host-based solutions like ANAMO with broader SIEMs like Splunk to achieve comprehensive security. The host-based tool provides granular, real-time endpoint threat detection, while the system-based SIEM offers holistic, enterprise-wide analysis and compliance reporting</span></p>
<h3><b>The Deeper Dive: Log Parsing vs. Comparative HashID Analytics</b></h3>
<p><span style="font-weight: 400;">The primary difference in real-time alerting between ANAMO CDM and Splunk lies in their focus, source of data, and method of detection. ANAMO provides deeper, agent-based alerts focused on host-centric anomalies, while Splunk offers broad, customizable alerts based on log data from across the enterprise. The best approach for many organizations is to use a combination of both. </span></p>
<h4><b>ANAMO CDM: Host-centric and predictive</b></h4>
<p><span style="font-weight: 400;">ANAMO&#8217;s alerting is designed for identifying and responding to threats at the endpoint level, with a focus on mitigating the threat dwell time. </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Data source: ANAMO uses a lightweight, &#8220;log-less&#8221; agent on open systems such as a Host or Server to collect and analyze data directly from endpoints. It continuously monitors key indicators like user permissions, network ports, and file systems, rather than simply parsing logs.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Detection method: It builds, monitors, and alerts upon modifications to the HashID of any system where Anamo is installed. It uses machine learning and generative AI to establish a baseline of normal host behavior. This allows it to proactively identify and alert on suspicious deviations, such as an authorized user making unauthorized changes or a zero-day exploit attempting to run.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Alerting speed: The alerts are generated in near real-time because the analysis is performed directly on the host data as it is collected. The goal is to notify security teams immediately about threats like lateral movement or privilege escalation.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Context: Alerts from ANAMO are highly contextualized for the host. They can flag specific users, groups, or software vulnerabilities that are associated with malicious activity.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Key alerts:</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Insider threats: Abnormal behavior from an authorized user, such as Permission or Port modifications or accessing sensitive directories.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Zero-day exploits: Anomalous behavior that indicates a new, unknown exploit, cross-referenced with CVEs and port changes combined with User behavior.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Adversary pivoting: Real-time tracking of unauthorized credential changes or movement across the system, associations to groups, or access to File paths. </span></li>
</ul>
</li>
</ul>
<h4><b>Splunk: System-wide and customizable</b></h4>
<p><span style="font-weight: 400;">Splunk&#8217;s alerting is built on its capability to ingest, index, and search massive volumes of machine-generated data from any source across the enterprise. </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Data source: Splunk&#8217;s alerts are based on data from closed systems such as network devices, servers, applications, and endpoints. The data is collected by forwarders, sent to indexers, and then searched.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Detection method: Alerts are triggered by a saved search that runs either on a schedule or continuously in real-time. Security analysts can create a wide range of custom alerts using Splunk&#8217;s Search Processing Language (SPL) to look for specific event patterns.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Alerting speed: Splunk offers both scheduled and continuous real-time searches.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Scheduled alerts are resource-efficient but introduce a delay. For example, a search that runs every 15 minutes will only detect an incident after the next scheduled search.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Continuous real-time searches provide a faster response but are resource-intensive, making them impractical for monitoring a markedly high volume of data.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Context: Splunk alerts benefit from a broader, enterprise-wide context. They can correlate events across many different systems, such as a failed login on a server combined with firewall alerts. However, the data can be voluminous and require more analysis to pinpoint the root cause on a specific host.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Key alerts:</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Failed logins: A specified number of failed logins on a server within a certain time window.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Access anomalies: An account accessing a resource from an unusual IP address or at an unusual time.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Vulnerability scans: Alerts generated when a vulnerability scanner logs a critical finding. </span></li>
</ul>
</li>
</ul>
<h4><b>Combining ANAMO CDM and Splunk for a robust defense</b></h4>
<p><span style="font-weight: 400;">For maximum security, organizations can integrate ANAMO with a SIEM like Splunk to achieve both deep host-level and broad system-level visibility.</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ANAMO detects and alerts on internal host-level threats in real-time, such as insider activity or zero-day exploits, providing immediate, granular insight.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ANAMO data is sent to Splunk to be correlated with other enterprise-wide security events from firewalls, network infrastructure, and other devices.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Splunk provides the holistic view, allowing security teams to see if an ANAMO alert on a single host is part of a larger, enterprise-wide attack.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Together, they enable faster and more informed threat response. The combination provides deep, forensic-level detail from ANAMO, alongside the broad, customizable alerting and reporting capabilities of Splunk.</span></li>
</ol>
<p><b>What does Internal, Host-Based, Continuous Diagnostics &amp; Mitigation SIEM Look Like?</b></p>
<p><b>Below</b><span style="font-weight: 400;">:  Screenshot of Anamo’s active CVE dashboard which without any effort or scheduling, autonomously interrogates all Transactions, Permissions, Users, CVEs, and Forensic Modifications of Internet Technology (IT) devices and Operational Technology (OT) devices, on both Windows and Linux Operating Systems:</span></p>
<p><a href="https://www.usprotech.com/files/2025/10/unnamed1.jpg"><img decoding="async" loading="lazy" class="size-medium wp-image-5441 aligncenter" src="https://www.usprotech.com/files/2025/10/unnamed1-300x142.jpg" alt="" width="300" height="142" /></a></p>
<p><b>Question</b><span style="font-weight: 400;">:  Who might have “777” or “WRX*** Privileged Accounts on any system across an entire Enterprise at any moment, and what is the correlated System and File Path which is associated to each Permission?</span></p>
<p><span style="font-weight: 400;"> Below: Screenshot of Anamo’s Permission Modification dashboard which without any effort or scheduling, autonomously interrogates all Transactions, Permissions, Ports, Users, Groups, and associated Forensic Modifications of Internet Technology (IT) devices and Operational Technology (OT) devices, on both Windows and Linux Operating Systems:</span></p>
<p style="text-align: center;"><a href="https://www.usprotech.com/files/2025/10/unnamed2.jpg"><img decoding="async" loading="lazy" class="alignnone size-medium wp-image-5442" src="https://www.usprotech.com/files/2025/10/unnamed2-300x139.jpg" alt="" width="300" height="139" /></a></p>
<p><b>Question</b><span style="font-weight: 400;">:  Across an entire Enterprise of IT and OT systems; Could automated SOC Notifications of any Port-Modification direct User-Session-Termination before Data Exfiltration transmission could begin?</span></p>
<p><span style="font-weight: 400;">Below: Screenshot of Anamo’s Port investigation dashboard which without any effort or scheduling, it autonomously interrogates all Ports and Transactions and gathers Forensic data on all Host-Based systems.  Data points which are Continuously Monitored and Alerted upon, including: The Port, Service On Port, Address, Protocol, Socket, Family, Net Namespace, PID and more, as shown:</span></p>
<p style="text-align: center;"><a href="https://www.usprotech.com/files/2025/10/unnamed3.jpg"><img decoding="async" loading="lazy" class="alignnone size-medium wp-image-5443" src="https://www.usprotech.com/files/2025/10/unnamed3-300x142.jpg" alt="" width="300" height="142" /></a></p>
<p><span style="font-weight: 400;">To Schedule a Demonstration or for More Information:  Contact Anamo.io</span></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/compare-siem-solutions-anamo-vs-splunk/">Compare SIEM Solutions: ANAMO vs. Splunk</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/compare-siem-solutions-anamo-vs-splunk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/10/unnamed-1024x364.png" type="image/png" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[unnamed]]></media:description>
		</media:content>	</item>
		<item>
		<title>RED HAT HACKED&#8230;.</title>
		<link>https://www.usprotech.com/red-hat-hacked/</link>
					<comments>https://www.usprotech.com/red-hat-hacked/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Wed, 15 Oct 2025 05:30:26 +0000</pubDate>
				<category><![CDATA[Continuous Diagnostics & Mitigation]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5436</guid>

					<description><![CDATA[<p>Red Hat admitted it was breached:</p>
<p>But have they failed to disclose what really happened? Maybe Red Hat is just going to wait that out, you know, just like the US Dept. of Treasury did after they were breached, then lied about the extent of the Hack, until the truth was realized and disclosed.</p>
<p>Oh well... here we go again. </p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/red-hat-hacked/">RED HAT HACKED&#8230;.</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 style="text-align: center;"><b>but CI&#8217;s at the Fed remain&#8230; Skeptical!</b></h2>
<p style="text-align: center;"><span style="font-weight: 400;">Published: October 3, 2025 </span></p>
<p>&nbsp;</p>
<h4><b>Red Hat admitted it was breached:</b></h4>
<p><span style="font-weight: 400;">But have they failed to disclose what really happened? Maybe Red Hat is just going to wait that out, you know, just like the US Dept. of Treasury did after they were breached, then lied about the extent of the Hack, until the truth was realized and disclosed.</span></p>
<h4><b>Oh well&#8230; here we go again. </b></h4>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">The author of this article doubles-down on corporate-crafted-speech when they bought the Red Hat Tag Line &#8220;It hasn’t found evidence of personal or sensitive data theft.&#8221; Just read it for yourself: </span><a href="https://cyberscoop.com/red-hat-gitlab-attack-consulting-data/"><b>https://cyberscoop.com/red-hat-gitlab-attack-consulting-data/</b></a></p>
<p><span style="font-weight: 400;">This breach all boils down to one single point of failure: Unauthorized Privileged Account Escalation. The breach will soon be further investigated, the results will establish that PII was accessed, and you can bet that data was exfiltrated, just like it was at the USDoT!</span></p>
<p><span style="font-weight: 400;">Today, it&#8217;s 100% clear that there was a Cybersecurity failure due to there being a lack of a Host-Based CDM-SIEM (such as the Anamo CDM) solution in place to prevent such a privilege escalation. IoA&#8217;s or &#8220;Indicators of Attack&#8221;, along with IoC&#8217;s (Indicators of Compromise), are the essential data sets in breach prevention. Breach prevention isn&#8217;t working for most entities because they have become reliant upon external Network-Based SIEM services that are slow and outside of a Host, therefore they remain blind and unable to see IoA&#8217;s and IoC&#8217;s from the inside of a compromised system.</span></p>
<h4><b>Over 5,000 Compromised:</b></h4>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Dear Red Hat: Here&#8217;s the way to eliminate the failure that led to your breach: </span><a href="https://www.youtube.com/watch?v=ByTKwyAzZB4"><b>https://www.youtube.com/watch?v=ByTKwyAzZB4</b></a><span style="font-weight: 400;">. </span></p>
<p>&nbsp;</p>
<p><span style="font-weight: 400;">Red Hat Consulting compromised over 5,000 Enterprise businesses and an untold number of Federal assets, putting them all at risk:</span></p>
<p><a href="https://doublepulsar.com/red-hat-consulting-breach-puts-over-5000-high-profile-enterprise-customers-at-risk-in-detail-90114f18f706"><b>https://doublepulsar.com/red-hat-consulting-breach-puts-over-5000-high-profile-enterprise-customers-at-risk-in-detail-90114f18f706</b></a></p>
<p>&nbsp;</p>
<h4><b>So, What Did Anamo&#8217;s CI&#8217;s at the Fed Say?</b></h4>
<p><span style="font-weight: 400;">CI&#8217;s in DC have disclosed some interesting facts and offered some of their own opinions. For the sake of keeping secrets, we&#8217;ll just state my &#8220;opinion.&#8221; Red Hat may have compromised client information, including government information. While that has not (yet) been confirmed, the investigation will likely prove that fact. Additionally, sources close to the matter have stated that the PII that was captured&#8230; may not have been encrypted either. If these statements are found to be true, I&#8217;ll have some additional juicy facts to share in my next post.</span></p>
<h4><b>Over 1,000 views &lt; 24 Hours: </b></h4>
<p><a href="https://www.linkedin.com/pulse/red-hat-hacked-cis-fed-remain-skeptical-jonathan-j5bac/?trackingId=eqqx1gcNQ8iPfvWwFFs8kg%3D%3D"><b>https://www.linkedin.com/pulse/red-hat-hacked-cis-fed-remain-skeptical-jonathan-j5bac/?trackingId=eqqx1gcNQ8iPfvWwFFs8kg%3D%3D</b></a></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/red-hat-hacked/">RED HAT HACKED&#8230;.</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/red-hat-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/10/Untitled-design-14.jpg" type="image/jpeg" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[Untitled design (14)]]></media:description>
		</media:content>	</item>
		<item>
		<title>Eliminate (SIEM) Blind Spots (While Adding CVE’s, Vul-Scan, EDR, Forensics &#038; eDiscovery)</title>
		<link>https://www.usprotech.com/eliminate-siem-blind-spots-while-adding-cves-vul-scan-edr-forensics-ediscovery/</link>
					<comments>https://www.usprotech.com/eliminate-siem-blind-spots-while-adding-cves-vul-scan-edr-forensics-ediscovery/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Fri, 19 Sep 2025 14:17:14 +0000</pubDate>
				<category><![CDATA[Breach]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[SIEM]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[Critical infrastructure]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber threat]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5430</guid>

					<description><![CDATA[<p>Still using 20+ Yr old Splunk or another Log-Based SIEM? While obvious, it’s 2025, and there’s been new SIEM technology available for years! It’s Anamo, a log-less SIEM that’s eliminating traditional “Blind Spots” and various anomalies related to System-Based Indicators of Attack (IoA”s), Modifications of Users, Permissions, Ports and Transactions… and much more!  Anamo is named after its ability to rapidly identify Host-Based attack vectors and other Indicators of Compromise (IoC’s) where all other Network-based SIEMs remain blind.</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/eliminate-siem-blind-spots-while-adding-cves-vul-scan-edr-forensics-ediscovery/">Eliminate (SIEM) Blind Spots (While Adding CVE’s, Vul-Scan, EDR, Forensics &#038; eDiscovery)</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2><span style="font-weight: 400;">Compare Traditional Rule-Based Log Parsing SIEM Systems with New “Log-Less” SIEM System Harnessing Forensic-Based Real Time Comparative HashID Analytics</span></h2>
<p><b>S</b><span style="font-weight: 400;">till using 20+ Yr old Splunk or another Log-Based SIEM? While obvious, it’s 2025, and there’s been new SIEM technology available for years! It’s Anamo, a log-less SIEM that’s eliminating traditional “Blind Spots” and various anomalies related to System-Based Indicators of Attack (IoA”s), Modifications of Users, Permissions, Ports and Transactions… and much more!  Anamo is named after its ability to rapidly identify Host-Based attack vectors and other Indicators of Compromise (IoC’s) where all other Network-based SIEMs remain blind.</span></p>
<p style="text-align: center;"><a href='https://www.usprotech.com/files/2025/09/2025-Anamo-CDM-vs-Traditional-SIEM-SHORT-Overview-Comparisons-Ver-09_15.pdf' class='big-button bigblue' target="_blank">Read More</a></p>
<p style="text-align: center;">
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/eliminate-siem-blind-spots-while-adding-cves-vul-scan-edr-forensics-ediscovery/">Eliminate (SIEM) Blind Spots (While Adding CVE’s, Vul-Scan, EDR, Forensics &#038; eDiscovery)</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/eliminate-siem-blind-spots-while-adding-cves-vul-scan-edr-forensics-ediscovery/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/09/SIEMpicture.jpg" type="image/jpeg" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[SIEMpicture]]></media:description>
		</media:content>	</item>
		<item>
		<title>CISA CYBERSECURITY 2025 REPORT / PRC BREACH OF CRITICAL INFRASTRUCTURE</title>
		<link>https://www.usprotech.com/cisa-cybersecurity-2025-report-prc-breach-of-critical-infrastructure/</link>
					<comments>https://www.usprotech.com/cisa-cybersecurity-2025-report-prc-breach-of-critical-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 22:40:29 +0000</pubDate>
				<category><![CDATA[Breach]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[Critical infrastructure]]></category>
		<category><![CDATA[cyber threat]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5412</guid>

					<description><![CDATA[<p>China probably currently represents the broadest, most active, and persistent cyber espionage threat to the U.S. government and private sector networks. China’s cyber pursuits and its industry’s export of related technologies increase the threats of aggressive cyber operations against the U.S. homeland, suppression of the free flow of information in cyberspace -such as U.S. web content- that Beijing views as threatening to the CCP’s hold on power, and the expansion of technology-driven authoritarianism globally.</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/cisa-cybersecurity-2025-report-prc-breach-of-critical-infrastructure/">CISA CYBERSECURITY 2025 REPORT / PRC BREACH OF CRITICAL INFRASTRUCTURE</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">China probably currently represents the broadest, most active, and persistent cyber espionage threat to the U.S. government and private sector networks. China’s cyber pursuits and its industry’s export of related technologies increase the threats of aggressive cyber operations against the U.S. homeland, suppression of the free flow of information in cyberspace -such as U.S. web content- that Beijing views as threatening to the CCP’s hold on power, and the expansion of technology-driven authoritarianism globally.</span></p>
<p style="text-align: center;"><a href='https://www.usprotech.com/files/2025/07/2025-CISA-PRC-Threat-Briefing-Ver-China-Adversary-Ver-Contributions-from-US-ProTech.pdf' class='big-button bigblue' target="_blank">Read More</a></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/cisa-cybersecurity-2025-report-prc-breach-of-critical-infrastructure/">CISA CYBERSECURITY 2025 REPORT / PRC BREACH OF CRITICAL INFRASTRUCTURE</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/cisa-cybersecurity-2025-report-prc-breach-of-critical-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/07/Untitled-design-12.png" type="image/png" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[Untitled design (12)]]></media:description>
		</media:content>	</item>
		<item>
		<title>THE UNITED STATES 2025 CYBER COMMAND CHALLENGE PROBLEM SET</title>
		<link>https://www.usprotech.com/the-united-states-2025-cyber-command-challenge-problem-set/</link>
					<comments>https://www.usprotech.com/the-united-states-2025-cyber-command-challenge-problem-set/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 22:24:03 +0000</pubDate>
				<category><![CDATA[CDM]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cyber Command]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[US Cyber Challenge]]></category>
		<category><![CDATA[cyber threat]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5410</guid>

					<description><![CDATA[<p>The United States Cyber Command (USCYBERCOM) has published its Command Challenge Problems to provide industry partners with clear insight into the critical technology areas where innovative solutions are needed. As the cyber threat landscape continues to evolve, the Department of Defense must stay ahead of adversaries by integrating cutting-edge capabilities in cybersecurity, artificial intelligence, network defense, and other key domains. By outlining these challenge problems, USCYBERCOM seeks to foster collaboration with industry leaders, ensuring that the nation’s cyber forces are equipped with the most advanced tools to protect national security interests.</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/the-united-states-2025-cyber-command-challenge-problem-set/">THE UNITED STATES 2025 CYBER COMMAND CHALLENGE PROBLEM SET</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The United States Cyber Command (USCYBERCOM) has published its Command Challenge Problems to provide industry partners with clear insight into the critical technology areas where innovative solutions are needed. As the cyber threat landscape continues to evolve, the Department of Defense must stay ahead of adversaries by integrating cutting-edge capabilities in cybersecurity, artificial intelligence, network defense, and other key domains. By outlining these challenge problems, USCYBERCOM seeks to foster collaboration with industry leaders, ensuring that the nation’s cyber forces are equipped with the most advanced tools to protect national security interests. This initiative highlights the Command’s commitment to working with external partners who can bring fresh ideas and emerging technologies into the Department of Defense’s cyber ecosystem.</p>
<p style="text-align: center;"><a href='https://www.usprotech.com/files/2025/07/2025-US-Gov-UNITED-STATES-Cyber-Command-Command-Problem-Challeng-Set-1.pdf' class='big-button bigblue' target="_blank">Read More</a></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/the-united-states-2025-cyber-command-challenge-problem-set/">THE UNITED STATES 2025 CYBER COMMAND CHALLENGE PROBLEM SET</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/the-united-states-2025-cyber-command-challenge-problem-set/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/07/2025-US-Cyber-Command-Challenge-1024x716.jpe" type="image/jpeg" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[2025 US Cyber Command Challenge]]></media:description>
		</media:content>	</item>
		<item>
		<title>THE NEW CYBER SHIELD ALLIANCE (CDM + DE-MFA)</title>
		<link>https://www.usprotech.com/the-new-cyber-shield-alliance-cdm-de-mfa/</link>
					<comments>https://www.usprotech.com/the-new-cyber-shield-alliance-cdm-de-mfa/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 22:10:19 +0000</pubDate>
				<category><![CDATA[Breach]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[Channel]]></category>
		<category><![CDATA[Channel Partners]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[Critical Infrastructure]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[DHS]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IT]]></category>
		<category><![CDATA[OT]]></category>
		<category><![CDATA[Continuous Diagnostic Mitigation]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5408</guid>

					<description><![CDATA[<p>ANAMO delivers near real-time risk information based upon next generation cybersecurity technologies that provide a unique and comprehensive view of four critical areas of cyber-hygiene including: </p>
<p>Software &#038; Hardware Vulnerability Management of the OS, Patch and Kernel. <br />
Attack-Surface Management from the Workstation and Server, to Cloud Containers. <br />
Objective-Based Behavioral Risk Analytics of Users, Permissions, File Tree, and Ports. <br />
A Gathering of Deep Data Forensics for Finite and Comprehensive, Global Reporting.</p>
<p>See all major operating systems (Windows, Linux, macOS) across the enterprise in near real-time. </p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/the-new-cyber-shield-alliance-cdm-de-mfa/">THE NEW CYBER SHIELD ALLIANCE (CDM + DE-MFA)</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>ANAMO </b><span style="font-weight: 400;">delivers </span><span style="font-weight: 400;">near </span><span style="font-weight: 400;">real</span><span style="font-weight: 400;">&#8211;</span><span style="font-weight: 400;">time </span><span style="font-weight: 400;">risk </span><span style="font-weight: 400;">information </span><span style="font-weight: 400;">based </span><span style="font-weight: 400;">upon </span><span style="font-weight: 400;">next </span><span style="font-weight: 400;">generation cybersecurity </span><span style="font-weight: 400;">technologies </span><span style="font-weight: 400;">that </span><span style="font-weight: 400;">provide </span><span style="font-weight: 400;">a </span><span style="font-weight: 400;">unique and </span><span style="font-weight: 400;">comprehensive </span><span style="font-weight: 400;">view </span><span style="font-weight: 400;">of </span><span style="font-weight: 400;">four </span><span style="font-weight: 400;">critical </span><span style="font-weight: 400;">areas </span><span style="font-weight: 400;">of </span><span style="font-weight: 400;">cyber</span><span style="font-weight: 400;">&#8211;</span><span style="font-weight: 400;">hygiene </span><span style="font-weight: 400;">including</span><span style="font-weight: 400;">: </span></p>
<ul>
<li><span style="font-weight: 400;">Software </span><span style="font-weight: 400;">&amp; </span><span style="font-weight: 400;">Hardware </span><span style="font-weight: 400;">Vulnerability </span><span style="font-weight: 400;">Management </span><span style="font-weight: 400;">of </span><span style="font-weight: 400;">the </span><span style="font-weight: 400;">OS</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">Patch </span><span style="font-weight: 400;">and </span><span style="font-weight: 400;">Kernel</span><span style="font-weight: 400;">. </span></li>
<li><span style="font-weight: 400;">Attack</span><span style="font-weight: 400;">&#8211;</span><span style="font-weight: 400;">Surface </span><span style="font-weight: 400;">Management </span><span style="font-weight: 400;">from </span><span style="font-weight: 400;">the </span><span style="font-weight: 400;">Workstation and </span><span style="font-weight: 400;">Server</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">to </span><span style="font-weight: 400;">Cloud </span><span style="font-weight: 400;">Containers</span><span style="font-weight: 400;">. </span></li>
<li><span style="font-weight: 400;">Objective</span><span style="font-weight: 400;">&#8211;</span><span style="font-weight: 400;">Based </span><span style="font-weight: 400;">Behavioral </span><span style="font-weight: 400;">Risk </span><span style="font-weight: 400;">Analytics </span><span style="font-weight: 400;">of </span><span style="font-weight: 400;">Users</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">Permissions</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">File </span><span style="font-weight: 400;">Tree</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">and </span><span style="font-weight: 400;">Ports</span><span style="font-weight: 400;">. </span></li>
<li style="text-align: left;"><span style="font-weight: 400;">A </span><span style="font-weight: 400;">Gathering </span><span style="font-weight: 400;">of </span><span style="font-weight: 400;">Deep </span><span style="font-weight: 400;">Data </span><span style="font-weight: 400;">Forensics </span><span style="font-weight: 400;">for Finite </span><span style="font-weight: 400;">and </span><span style="font-weight: 400;">Comprehensive</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">Global </span><span style="font-weight: 400;">Reporting</span><span style="font-weight: 400;">. </span></li>
</ul>
<p style="text-align: left;"><span style="font-weight: 400;">See </span><span style="font-weight: 400;">all </span><span style="font-weight: 400;">major </span><span style="font-weight: 400;">operating </span><span style="font-weight: 400;">systems </span><span style="font-weight: 400;">(</span><span style="font-weight: 400;">Windows</span><b>, </b><span style="font-weight: 400;">Linux</span><span style="font-weight: 400;">, </span><span style="font-weight: 400;">macOS</span><b>) </b><span style="font-weight: 400;">across </span><span style="font-weight: 400;">the </span><span style="font-weight: 400;">enterprise </span><span style="font-weight: 400;">in </span><span style="font-weight: 400;">near </span><span style="font-weight: 400;">real</span><span style="font-weight: 400;">&#8211;</span><span style="font-weight: 400;">time</span><span style="font-weight: 400;">.<br />
</span></p>
<p style="text-align: center;"><span style="font-weight: 400;"><a href='https://www.usprotech.com/files/2025/07/Anamo-Nimbus-Key-ID-White-Paper-002.pdf' class='big-button bigblue' target="_blank">Read More</a><br />
</span></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/the-new-cyber-shield-alliance-cdm-de-mfa/">THE NEW CYBER SHIELD ALLIANCE (CDM + DE-MFA)</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/the-new-cyber-shield-alliance-cdm-de-mfa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/07/2025-Cyber-Shield-Alliance--1024x571.jpe" type="image/jpeg" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[2025 Cyber Shield Alliance]]></media:description>
		</media:content>	</item>
		<item>
		<title>ANAMO “CDM” Selected to be featured at: DEFCON HACKING VILLAGE</title>
		<link>https://www.usprotech.com/anamo-cdm-selected-to-be-featured-at-defcon-hacking-village/</link>
					<comments>https://www.usprotech.com/anamo-cdm-selected-to-be-featured-at-defcon-hacking-village/#respond</comments>
		
		<dc:creator><![CDATA[USPROTECH]]></dc:creator>
		<pubDate>Mon, 30 Jun 2025 03:43:03 +0000</pubDate>
				<category><![CDATA[SMB Technology]]></category>
		<category><![CDATA[Technology News]]></category>
		<category><![CDATA[CDM]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<guid isPermaLink="false">https://www.usprotech.com/?p=5368</guid>

					<description><![CDATA[<p> This year, all eyes will once again be on DEFCON (https://defcon.org/index.html). DEFCON is where the world’s elite Hackers come to play under the heat of the Las Vegas sun, and by night, well that’s Vegas!  Still, inside the cool dark ballrooms of the Convention Center and swanky Strip hotels, stakes are high. Crowds will be [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://www.usprotech.com/anamo-cdm-selected-to-be-featured-at-defcon-hacking-village/">ANAMO “CDM” Selected to be featured at: DEFCON HACKING VILLAGE</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.usprotech.com/files/2025/06/USPROimage5.png"><img decoding="async" loading="lazy" class="alignnone size-medium wp-image-5383" src="https://www.usprotech.com/files/2025/06/USPROimage5-300x248.png" alt="" width="300" height="248" srcset="https://www.usprotech.com/files/2025/06/USPROimage5-300x248.png 300w, https://www.usprotech.com/files/2025/06/USPROimage5.png 333w" sizes="(max-width: 300px) 100vw, 300px" /></a><a href="https://www.usprotech.com/files/2025/06/Screenshot-2025-06-29-8.42.01-PM.png"><img decoding="async" loading="lazy" class="alignnone wp-image-5384" src="https://www.usprotech.com/files/2025/06/Screenshot-2025-06-29-8.42.01-PM-300x236.png" alt="" width="318" height="250" /></a></p>
<p><span style="font-weight: 400;"> </span><b>This year, all eyes will once again be on DEFCON</b><span style="font-weight: 400;"> (</span><a href="https://defcon.org/index.html"><span style="font-weight: 400;">https://defcon.org/index.html</span></a><span style="font-weight: 400;">). DEFCON is where the world’s elite Hackers come to play under the heat of the Las Vegas sun, and by night, well that’s Vegas!  Still, inside the cool dark ballrooms of the Convention Center and swanky Strip hotels, stakes are high. Crowds will be watching and waiting to see who will win the Big-Fight.  Anamo (</span><a href="https://anamo.io/"><span style="font-weight: 400;">https://anamo.io/</span></a><span style="font-weight: 400;">), the  newcomer (</span><i><span style="font-weight: 400;">The Challenger</span></i><span style="font-weight: 400;">) has been given Vegas-Odds to challenge the Red Teams (</span><i><span style="font-weight: 400;">The Reigning Champions</span></i><span style="font-weight: 400;">) of DEFCON, in an all-out battle to determine who will dominate C2 of US-Based Critical Infrastructure assets.</span></p>
<p><b>Who will take home the prize belt?</b><span style="font-weight: 400;">  Check with your favorite Sports Book and join in the fun, because this year, you can bet this fight will go to the Final-Round!</span></p>
<p>&nbsp;</p>
<h3><b>DEFCON and US ProTech</b></h3>
<p><span style="font-weight: 400;">DEFCON celebrates its 33</span><span style="font-weight: 400;">rd</span><span style="font-weight: 400;"> year in Las Vegas.  US ProTech, a 25-Year-Old Cybersecurity MSSP and software development company, also based in Las Vegas, NV, created products like the GRC App and the Anamo CDM Cybersecurity platform. US ProTech security engineers were once Red-Team Pen-Testers which spurred the concept to reverse engineer Pen-testing techniques and Anamo was born. Now matured and currently deploying version 3, Anamo delivers it functionality from patent-pending technology that evaluates Comparative HashID Analytics against a deep collection of Cybersecurity forensics nested in a set of relational databases </span></p>
<p><span style="font-weight: 400;">Anamo claims the ability to identify a Hacker, on any system (where the Anamo Agent has been deployed) in one-move.  Yes, the facts are out, Anamo has cracked the code to delivering near real-time dashboard updates that track IoA’s (Indicators or Attack) and IoC’s (Indicators of Compromise) using Never-Before-Seen functionality that has been described by a General of the U.S. Air Force, as “Phenomenal!” </span></p>
<p>&nbsp;</p>
<h3><b>The Audience will be top-notch</b></h3>
<p><span style="font-weight: 400;">Expected overseers include ranking members of CISA, the DHS, even the FBI will be in the room (no doubt wearing their refined costumes of dark suits). But it will be the Red Teams of Hackers who will be most present in The Hacker Village as they prepare and attack replications of some our Nation’s most important industrial systems, aka Critical Infrastructure. Who will capture the flag?  The cat and mouse games played at DEFCON have long been revered as the playground of the BlackHats.  But over the past 20 years, GrayHats and WhiteHats are now equally represented and equally dangerous behind those rather attractive back-lite keyboards. Can the Red Teams usurp the security measures of today’s critical infrastructure?  Will they be able to land, load, and maneuver at will in an effort to “Capture the Flag?  Or will Anamo “CDM,” in support of the Blue Teams, demonstrate that CDM (aka Continuous Diagnostics &amp; Mitigation) is better, faster, and more effective at identifying the hackers and supporting the elimination of unauthorized privileged account escalation.  The action is on!  And this August 7</span><span style="font-weight: 400;">th</span><span style="font-weight: 400;"> through the 10, the competition will take center stage.  Be there to witness the action, limited tickets to DEFCON are still available, get your tickets today!</span></p>
<span class="et_bloom_bottom_trigger"></span><p>The post <a rel="nofollow" href="https://www.usprotech.com/anamo-cdm-selected-to-be-featured-at-defcon-hacking-village/">ANAMO “CDM” Selected to be featured at: DEFCON HACKING VILLAGE</a> appeared first on <a rel="nofollow" href="https://www.usprotech.com">US ProTech, Inc.</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.usprotech.com/anamo-cdm-selected-to-be-featured-at-defcon-hacking-village/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		
		<media:content url="https://www.usprotech.com/files/2025/06/USPROimage2-1024x225.png" type="image/png" medium="image" width="100%" height="auto">
				<media:description type="plain"><![CDATA[USPROimage2]]></media:description>
		</media:content>	</item>
	</channel>
</rss>
