A cyber-extortion gang is using phishing emails, social engineering, and a network of phony call centers to scam victims out of hundreds of thousands of dollars. Enhance your cyber security asap. These cyber criminals are tricking victims into allowing them remote access into their PC, then they steal data and threaten to leak it if […]
The most common victims targeted work at organisations that weren’t using multi-factor authentication (MFA) to secure their accounts. Business Email Compromise (BEC) attacks are one of the most lucrative forms of cyber crime: According to the FBI, the combined total lost is over $43 billion and counting, with attacks in at least 177 countries. These attacks […]
Microsoft rolls out a new security feature that should significantly slow down password attacks against Windows devices.The latest preview of Windows 11 ships with the SMB server authentication rate limiter on by default. This makes Windows 11″a very unattractive target” for hackers trying to steal credentials, since it’s much more time-consuming for them to target […]
A stealthy new form of malware is targeting Linux systems in attacks that can take full control of infected devices, and use this access to install crypto-mining malware. This malware has been detailed by cybersecurity researchers at AT&T Alien Labs, they call it Shikitega. This malware targets endpoints and Internet of Things devices that run on Linux operating […]
Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Cybersecurity focuses on protecting electronic information on websites, networks, or devices from hackers. Through advanced technology and sophisticated processes, cybersecurity professionals, like ourselves at bva, help keep data safe and accessible. Individuals and businesses alike face cybersecurity threats. In addition, businesses need protection from unauthorized data access, both from inside and outside the organization. Strong […]
Keeping on top of cybersecurity risks is a constant challenge. Threats including phishing, malware and ransomware are continually evolving and adapting, as cyber criminals regularly find new, innovative ways to conduct malicious hacking campaigns, break into computer systems and find a way to stay there. Many companies are having difficulties keeping up with the technological world and threats that come with […]