Cybersecurity Blog


Subscribe

Posts tagged: Malware

Category: Cybersecurity

Google Skynet Concerns: Big Tech and Malware

Google Skynet Concerns: Big Tech and Malware


Posted July 28, 2021 in Blockchain, Ransomware, Cryptocurrency, Malware, AI, Data Breach

Big Tech's response to the malware crisis raises serious concerns about centralized control. Explore the blockchain...

HIPAA Training Guide: Why People Are Your Weak Link

HIPAA Training Guide: Why People Are Your Weak Link


Posted July 22, 2021 in HIPAA, Compliance, Malware, Data Breach

The number one cause of HIPAA breaches is human error. Learn why effective HIPAA training is critical and how to...

HIPAA Help Blueprint: Your Complete 2019 Guide

HIPAA Help Blueprint: Your Complete 2019 Guide


Posted July 22, 2021 in HIPAA, Compliance, AI, Blockchain, Malware, Data Breach

Everything you need to know about HIPAA compliance in one comprehensive blueprint. Get answers on training,...

Rising Cyberattacks: How to Protect Your Business Now

Rising Cyberattacks: How to Protect Your Business Now


Posted June 24, 2021 in Malware, Cryptocurrency, Work from Home, Ransomware, Bitcoin, Compliance

Ransomware is now a national security threat. Learn why attacks are increasing, which industries are targeted, and...

Billions of Passwords Leaked: Change Yours Immediately

Billions of Passwords Leaked: Change Yours Immediately


Posted June 10, 2021 in Data Breach, Malware, Cryptocurrency

Billions of passwords were exposed in a massive data dump. Check if your credentials are compromised and take steps...

Colonial Pipeline Recovers Ransomware Payment

Colonial Pipeline Recovers Ransomware Payment


Posted June 7, 2021 in Ransomware, Data Breach, Malware

The DOJ recovered a significant portion of Colonial Pipeline's $4.4M ransom payment. See how authorities tracked the...

Malicious USB Cables: Hidden Cybersecurity Threat

Malicious USB Cables: Hidden Cybersecurity Threat


Posted June 3, 2021 in Malware, Data Breach, Penetration Testing

Hackers now embed attack tools inside ordinary-looking USB cables. Learn why you should never borrow a charging cord...

Colonial Pipeline Pays $5M Ransom: What Went Wrong

Colonial Pipeline Pays $5M Ransom: What Went Wrong


Posted May 14, 2021 in Ransomware, Data Breach, Malware

Colonial Pipeline paid $5 million to hackers who crippled US fuel supplies. Learn how the attack succeeded and what...

Biden Signs Cybersecurity Executive Order

Biden Signs Cybersecurity Executive Order


Posted May 13, 2021 in Data Breach, Compliance, Malware

The White House executive order mandates sweeping federal cybersecurity improvements. Discover what the new...

Cyberattack Forces Major Pipeline to Shutdown Operations

Cyberattack Forces Major Pipeline to Shutdown Operations


Posted May 8, 2021 in Data Breach, Cloud Security, Malware

Colonial Pipeline, a company that operates over 5,000 miles of gasoline and jet fuel pipelines from Texas all the way...

Colonial Pipeline Cyberattack Shuts Operations

Colonial Pipeline Cyberattack Shuts Operations


Posted May 8, 2021 in Data Breach, Cloud Security, Malware

A ransomware attack forced Colonial Pipeline to shut down 5,500 miles of fuel infrastructure. Learn how the attack...

Facebook Data Leak: How to Protect Your Information

Facebook Data Leak: How to Protect Your Information


Posted April 5, 2021 in Data Breach, Malware, Cloud Security

Over 500 million Facebook users' personal data was posted in a hacking forum. Check if you are affected and take...