Highly skilled cyber attackers are using a never-before-seen technique to hide their malicious activities and compromise victims with trojan malware backdoors. Thisintelligence gathering and espionage campaign has been detailed by cybersecurity researchers at Symantec. The researchers found that attackers can spend more than 18 months inside the victims networks, all while taking steps to ensure their […]
Happy Cybersecurity Awareness Month! Throughout the month, we’re partnering with Sophos to provide bitesize cyber security guidance based on the event’s weekly themes. Week 4 Focus: Recognizing and Reporting Phishing Phishing emails fraudulently impersonate others with the goal of getting you to reveal personal information like passwords or card details. Be mindful, phishers commonly play on the following emotional triggers: Curiosity Hope Necessity […]
Happy Cybersecurity Awareness Month! Throughout the month, we’re partnering with Sophos to provide bitesize cyber security guidance based on the event’s weekly themes. Week 3 Focus: Updating Software Updates add new/enhanced features, security fixes, and boost general performance! The exploitation of unpatched vulnerabilities in software/applications was the root cause of almost half of cyber incidents investigated in 2021 by Sophos. Keeping […]
Microsoft has warned that attackers are already taking advantage of recently disclosed zero-day exploits to hack into victim’s networks and steal data, and more attacks are likely on the way. The two new zero-day vulnerabilities in Microsoft Exchange Server (CVE-2022-41040 and CVE-2022-41082) were detailed last week, with warnings that they could allow hackers to remotely gain […]
There’s at least one thing Republicans and Democrats can agree on in the US Senate: the importance of open-source software in today’s tech world. Seriously. As US Senator Gary Peters (D-MI) said last week, “Open-source software is the bedrock of the digital world.“ His partner across the aisle, Rob Portman (R-OH), agreed, saying, “The computers, […]
Microsoft Warns: Hackers are using open source software and bogus social media accounts to dupe software engineers and IT support staff with fake job offers, that in reality lead to malware attacks. According to threat analysts from Microsoft’s advanced persistent threat (APT) research group, a phishing hacking crew, linked to North Korea’s armed forces, has […]
Cloud applications and software have become a key part of everyday life for employees and businesses. Enhance your cyber security awareness to avoid simple errors that can make your cloud an easy target for hackers. The popularity of cloud applications and software has risen significantly in recent years, and while using cloud services can be beneficial […]
The dark web, or darknet, is the part of the internet that is difficult to access without the proper tools and authorizations. An average, everyday web surfer using a commonly-available web browser like Chrome or Explorer isn’t likely to be taking a virtual walk on the dark side, but security leaders still must make an […]
Cyber crime is on the rise, and cyber criminals are exploring new ways of conducting distributed denial of service (DDoS) attacks. Making them harder to protect against and more effective at causing disruption. DDoS attacks are a relatively simple, but potent, form of cyberattack in which cyber criminals overload services with web traffic, slowing them down […]