Search Results for: malicious actors Blog Post How Malicious Actors Hide Apps on Their Devices October 25, 2019 When investigating a mobile device, whether a Tablet or Phone examiners should be wary of the many methods that can... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,... Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email... Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts... Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19... Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered... Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Blog Post Iranian Hacking Group Targets Universities September 20, 2019 The Cobalt Dickens hacking group run out of Iran is targeting universities in a global phishing campaign. The group, linked... Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the... Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a... Blog Post Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack... Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent... Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services... Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...
Blog Post How Malicious Actors Hide Apps on Their Devices October 25, 2019 When investigating a mobile device, whether a Tablet or Phone examiners should be wary of the many methods that can...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post Chinese Hackers Compromising Critical Flaws in Microsoft Exchange Servers March 9, 2021 The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a red warning for the users of the Microsoft Exchange email...
Blog Post WordPress Plugin Posed Vulnerabilities Endangering Thousands of Website November 10, 2021 Several potentially exploitable issues have been detected in the Brizy Page Builder, a WordPress plugin that posed vulnerabilities. Cybersecurity experts...
Blog Post Dark Web Marketplaces Looking to Dupe Buyers with Illicit COVID-19 Vaccines April 8, 2021 Recently, there has been a surge of activity regarding supposed COVID-19 vaccine sales on dark web marketplaces (DWMs). Fake COVID-19...
Blog Post Understanding Vulnerability Disclosure and Why It Matters November 29, 2021 When developing any information technology system, software, or hardware, errors and loopholes are nearly unavoidable. These vulnerabilities are often discovered...
Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own...
Blog Post Iranian Hacking Group Targets Universities September 20, 2019 The Cobalt Dickens hacking group run out of Iran is targeting universities in a global phishing campaign. The group, linked...
Blog Post Let’s Understand the Endpoint Security and the Significance of Endpoint Detection and Response (EDR) Software February 9, 2021 The trend is on the rise to make access to data more fluid. Employees comfortably connect their devices to the...
Blog Post Risk of Hybrid Working – Combining Remote and On-Prem Work April 26, 2021 Even before the Coronavirus pandemic, organizations and businesses were playing with the idea of more remote working environments as a...
Blog Post Twitter Breach: The Aftermath and Lessons Learned August 18, 2020 Many high-profile Twitter accounts including Bill Gates, Barack Obama, Elon Musk, Kim Kardashian were hacked this past July. This attack...
Blog Post LIFARS Insights: Logon Type Codes April 10, 2020 When monitoring your network, you’ll come across several logon types codes. We know that event Ids 528 and 540 represent...
Blog Post Phishing for Office 365 logins using Google Cloud Services August 5, 2020 Fraudsters are constantly looking for new ways of collecting login details. Malicious individuals have increasingly turned to public cloud services...
Blog Post The Overlooked Cyber Risk of Employees Returning to the Offices from Quarantine August 24, 2020 The COVID-19 pandemic has created many challenges for businesses. Employees have been tasked with working remotely from home, in addition...