Hackers

A Guide to Help You Understand All the Digital Threats You Face

Malware is a commonality in today’s computing environment, though businesses do everything in their power to avoid encountering it. Some people have difficulty identifying threats, which makes for a dangerous situation whenever they actually have to handle them. We’ve put together a malware guide that will help your employees identify the most common types of threats out there, as well...

Read More

The Shadowy Exploits of this Hacking Group Could End Up Harming Your Business

After the WannaCry attack, it would seem that the hacking group known as the Shadow Brokers (or TheShadowBrokers) is in possession of some extremely potent information. This makes it all the more disconcerting that the group has announced the start of their own subscription service. The group made this announcement via a blog post. “In June, TheShadowBrokers is announcing ‘TheShadowBrokers...

Read More

Hack Enabled by NSA-Developed Tool

Hackers aren’t the only ones out there developing malware tools, but sometimes, they get their hands on some of the others. This is precisely what happened when Double Pulsar, a malware that the NSA has used in the past, was paired with a Chinese hacking tool and used to attack Hong Kong and Belgium in 2016. Double Pulsar was, in...

Read More

Ransomware Can Just Be Devastating

Ransomware is still going strong, and now more than ever it’s important to emphasize the danger that it poses for your organization. Even municipalities and other high-profile targets are at risk of being taken down by ransomware. Since 2013, over 170 government systems at the county, city, or state levels have been attacked. Keep in mind that these numbers don’t...

Read More

Understanding the Dangers of a Man-in-the-Middle Attack

Have you ever played the telephone game? One person in a group whispers a phrase to another, who then passes it to another, and the fun is had when the group shares what they heard and how the message was garbled along the way. In many ways, this activity is similar to a Man-in-the-Middle (MitM) attack - although the attack...

Read More

Most Noteworthy Data Breaches in 2019

With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018 over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Today we take a look at some of the most noteworthy data breaches that...

Read More

ALERT: Over a Million Asus Laptops Could Have Been Hacked

  • By Rafiq Masri
  • July 5, 2020
  • Alerts

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at. Numbers are still coming in as far as how widespread this issue is. As of Monday, cybersecurity firm Kaspersky Lab said potentially thousands...

Read More

8 Ways to Protect Your Network Against Ransomware

Sometimes old becomes new again. Such is the case with ransomware attacks, which have become popular once more. First released in 1989, ransomware infects a system and “locks out” the user from accessing the device or files on it. Only when the victim agrees to pay a ransom, usually in the form of bitcoins, can the system be unlocked and...

Read More

How to Go About Detecting Cryptomining

One of the most dangerous and upcoming threats out there is cryptojacking. This process involves a malicious entity installing cryptomining malware on a user’s device without their knowledge or consent, allowing for a steady, reliable stream of income. What are the details behind cryptomining, and how can you keep your devices from becoming complicit in the schemes of hackers? Let’s...

Read More

SamSam Is More than a Computer Virus

I think by now most people understand just how dangerous ransomware is. Even with some of the ridiculous names they have like Gandcrab, Jigsaw, and WannaCry. Hell, two strains even have names from the James Bond canon: LeChiffre and GoldenEye. But one funny-named strain of ransomware, SamSam, has been devastating information systems for sometime, and has caught the eye of...

Read More