Hackers

Phishing Can Have Multiple Attack Vectors

Phishing Can Have Multiple Attack Vectors

  • By Rafiq Masri
  • February 24, 2023
  • Security

Phishing is a pressing issue for everyone, not just businesses. The main problem is that the phishing messages keep getting more and more sophisticated and keep coming and coming until, eventually, something negative happens. For this week’s tip, we wanted to discuss the different types of phishing you can encounter.  (more…)

Read More
Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

Face It, You Probably Don’t Know Much About Cybersecurity, Part 2

  • By Rafiq Masri
  • February 15, 2023
  • Security

Last week, we went through why training is such a crucial part of your business’ cybersecurity process. This week we will turn our attention to some of the tools and other strategies that your organization should be using to mitigate security threats.  (more…)

Read More
Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

Face It, You Probably Don’t Know Much About Cybersecurity, Part 1

  • By Rafiq Masri
  • February 8, 2023
  • Security

Admit it, you don’t know all that much about cybersecurity. In this blog, we spend a lot of time discussing security issues. After all, today there are more threats than ever and many different types of problems that IT administrators, business decision-makers, and even individual employees have to deal with. Over the next two weeks, we have decided to discuss...

Read More
Five of the Worst Security Breaches of 2022

Five of the Worst Security Breaches of 2022

  • By Rafiq Masri
  • February 6, 2023
  • Security

We make a consistent point to urge our readers to take their organizational cybersecurity seriously. This is because there are threats out there that are targeting your business, no matter how small it is. This week, we take a break from the itemized list of security tips to present 2022’s most devastating cyberattacks to give you an idea what hackers...

Read More
What Twitter’s API Breaches Mean for Cybersecurity Trends

What Twitter’s API Breaches Mean for Cybersecurity Trends

  • By Rafiq Masri
  • January 16, 2023
  • Security

Back in December of 2021, an API vulnerability impacting Twitter was disclosed. Just a few months later, in July, data from more than 5.4 million users—obtained through this vulnerability—was put up for sale, and more recently, another hacker shared the data online. Let’s take the opportunity to examine the concept of an API attack, and what can and should be...

Read More
The Vatican Proves that No One is Immune to Cyberattacks

The Vatican Proves that No One is Immune to Cyberattacks

  • By Rafiq Masri
  • December 28, 2022
  • Security

While it may not be the first target one might think of when it comes to cyberattacks, a recent Distributed Denial of Service (DDoS) attack on the Vatican’s official website only proves that cyberattacks can potentially influence any organization. Let’s consider the situation, as well as what lessons we can all take away from it. (more…)

Read More
What Exactly is a Zero-Day Exploit?

What Exactly is a Zero-Day Exploit?

  • By Rafiq Masri
  • December 23, 2022
  • Security

There are countless known threats out there that create security headaches for network administrators, but it’s not the known flaws that are the most dangerous; it’s the unknown ones that have even more potential to derail operations, expose sensitive data in security breaches, and end businesses entirely. These zero-day flaws or exploits are extremely important to keep informed about. (more…)

Read More
The Phisher—A Modern Take on The Raven

The Phisher—A Modern Take on The Raven

  • By Rafiq Masri
  • October 31, 2022
  • Security

What if Edgar Allan Poe wrote “The Raven” during the information age? (more…)

Read More
Why BEC is Such a Negative Circumstance for Any Organization

Why BEC is Such a Negative Circumstance for Any Organization

  • By Rafiq Masri
  • October 28, 2022
  • Security

It doesn’t always take a complicated malware or ransomware attack to break your business. Sometimes it’s as easy as someone sending you an email and pretending they have authority over you. Compromising a business email is one of the most common and easy hacking attacks to pull off, so you should be aware of how to put a stop to it....

Read More
The Dangers of Near-Constant Phishing Attacks

The Dangers of Near-Constant Phishing Attacks

  • By Rafiq Masri
  • October 20, 2022
  • Security

For twenty years, hackers have tried to breach organizational networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The...

Read More