Cybersecurity Blog


Subscribe

Category: Cybersecurity

Spear Phishing Alert: Autumn Aperture Macro Attack

Spear Phishing Alert: Autumn Aperture Macro Attack


Posted October 5, 2019 in Malware, Data Breach, Cloud Security

A new spear phishing campaign called Autumn Aperture targets U.S. organizations using obscure file formats. Learn why...

Warning: 400 Million Facebook Phone Numbers Exposed

Warning: 400 Million Facebook Phone Numbers Exposed


Posted September 11, 2019 in Data Breach, Compliance, Digital Forensics

An unprotected server exposed 419 million Facebook users' phone numbers globally. Find out if your data was...

Critical Chrome Security Fix: Update Your Browser Now

Critical Chrome Security Fix: Update Your Browser Now


Posted September 4, 2019 in Malware, Data Breach, Cloud Security

Google Chrome's security lead issued an urgent warning to update immediately. A critical zero-day exploit is being...

Are Cyber Insurance Companies Fueling Ransomware?

Are Cyber Insurance Companies Fueling Ransomware?


Posted September 3, 2019 in Ransomware, Compliance, Data Breach

Insurance companies pay ransoms because it saves them money. But is this practice driving more attacks? Explore the...

MegaCortex 2.0 Ransomware: Why Ransoms Will Surge

MegaCortex 2.0 Ransomware: Why Ransoms Will Surge


Posted September 3, 2019 in Ransomware, Digital Forensics, Malware

MegaCortex 2.0 is ready for wide-scale attacks with enhanced capabilities. Learn what makes this ransomware dangerous...

Software Developers Now Top Phishing Targets

Software Developers Now Top Phishing Targets


Posted August 15, 2019 in Malware, Data Breach, Cloud Security

Glasswall threat intelligence reveals tech workers face nearly half of all phishing campaigns. See why developers are...

AT&T Insider Bribery Scheme: 20-Year Sentence Looms

AT&T Insider Bribery Scheme: 20-Year Sentence Looms


Posted August 7, 2019 in Malware, Cloud Security, Data Breach

Pakistani national Muhammad Fahd faces 20 years for bribing AT&T employees to unlock phones illegally. See how...

How Cybersecurity Practices Impact Your Company Valuation

How Cybersecurity Practices Impact Your Company Valuation


Posted July 30, 2019 in Compliance, Data Breach, Malware

Intangible assets now drive company value. See how strong cybersecurity practices directly increase your business...

FlawedAmmyy RAT: Why Security Training Stops It

FlawedAmmyy RAT: Why Security Training Stops It


Posted July 18, 2019 in Malware, Work from Home, Data Breach

Microsoft warns of FlawedAmmyy RAT attacks using Windows tools. Discover why security awareness training is your...

Ransomware: Should You Pay the Ransom or Refuse?

Ransomware: Should You Pay the Ransom or Refuse?


Posted July 15, 2019 in Ransomware, Compliance, Data Breach

Every ransomware victim faces the same dilemma: pay or refuse. Explore the pros, cons, and expert advice to make the...

NY Senate Bill 224: Next Major State Privacy Law?

NY Senate Bill 224: Next Major State Privacy Law?


Posted July 2, 2019 in Compliance, Data Breach, Malware

New York's Senate Bill 224 could become the next major consumer privacy law after California's CCPA. Learn what it...

ShadowGate Malware: Catastrophic Instant Lockdown

ShadowGate Malware: Catastrophic Instant Lockdown


Posted July 1, 2019 in Cryptocurrency, Bitcoin, Malware, Data Breach

ShadowGate malware locks computers instantly and demands massive bitcoin ransoms. Learn about this devastating threat...