Security for All, Not Some: Safeguarding the Unconnected
At a recent event, multiple companies asked if you really need to protect air-gapped technology, and, if so, how to do it. It’s easy to assume that if a system […]
At a recent event, multiple companies asked if you really need to protect air-gapped technology, and, if so, how to do it. It’s easy to assume that if a system […]
In today’s interconnected digital landscape, cybersecurity threats continue to evolve at an alarming rate. Malicious actors constantly seek new ways to exploit vulnerabilities and infect systems with malware. As a […]
A recent vulnerability in Microsoft Teams has emphasized the power of prevention-centric cybersecurity. This bug enables malware delivery from external accounts. This poses a significant threat to businesses that are […]
In today’s digital landscape, both protected and unprotected environments face numerous cybersecurity challenges. Managed Service Providers (MSPs) play a vital role in safeguarding these environments, utilizing security services such as […]
The introduction of new top-level domains (TLDs) by Google Registry, including .zip and .mov, has raised concerns within the infosec community regarding cybersecurity risks. Deep learning and machine learning can […]
Deep learning and machine learning are both branches of artificial intelligence (AI). They involve building algorithms to analyze and make predictions or decisions based on data. However, there are some […]
Imagine you’ve just purchased a certified used car. As part of due diligence, you take that car into another dealership for a full workup. That dealership tells you that […]
Ransomware continues to be a pressing cybersecurity threat, causing significant disruptions and financial losses for individuals, businesses, and municipalities. The recent 2023 Dallas ransomware incident serves as a stark reminder […]
Recently, we attended several industry events. Looking around the vendor halls, there were no less than 30 vendors providing cybersecurity tools. All of them presented value and hit different portions […]
EvilExtractor malware extracts sensitive or confidential information from a victim’s computer system without their consent or knowledge. It falls under the category of information-stealing malware, which is a prevalent and […]
Emotet, a self-updating modular trojan horse malware, has again raised its ugly head. Emotet, also known as “The Banker,” was first discovered in 2014 as a banking Trojan. However, over […]
Although a patch alleviates the threat, a vulnerability dubbed GhostToken reveals the danger of installing third-party integrations into sanctioned apps. GhostToken allowed attackers irrevocable access to an individual’s Google account […]