Hackers

The Dangers of Near-Constant Phishing Attacks

The Dangers of Near-Constant Phishing Attacks

For twenty years, hackers have tried to breach organizational networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was extremely hard to breach. The...

Read More
This Ransomware Group’s Antics Remind Us How Dangerous Ransomware Can Be

This Ransomware Group’s Antics Remind Us How Dangerous Ransomware Can Be

  • By Rafiq Masri
  • October 10, 2022
  • Security

Just like any other business that takes some time to get to know a new client, a new type of ransomware can take up to two weeks to map a network before it goes in for the kill. This threat from a group called Zeppelin has the potential to be a major threat actor in the ransomware space. (more…)

Read More
Have You Been Breached? Here’s How to Find Out

Have You Been Breached? Here’s How to Find Out

  • By Rafiq Masri
  • August 17, 2022
  • Security

Did you know that you could be the victim of a data breach without even knowing it? It’s possible, really. If a hacker has managed to infiltrate a website or service that you use without giving up the goat, so to speak, they could have your information and you might not even know about it. Thankfully, there are ways around...

Read More
All You Need to Know About the Raspberry Robin Worm

All You Need to Know About the Raspberry Robin Worm

  • By Rafiq Masri
  • August 15, 2022
  • Security

Using USB drives to spread threats is certainly not a novel concept, and you should always be wary of potential threats using USB drives to make their rounds. In particular, a new and emerging threat called the Raspberry Robin worm could shake things up in the world of cybersecurity. What is this threat, and how can you keep yourself and...

Read More
The Threat Landscape and What You Can Do to Navigate It

The Threat Landscape and What You Can Do to Navigate It

Cybercrime is up, way up. This is problematic for businesses in general, but can be a really serious issue for those companies that don’t have security measures in place that can thwart potential attacks. Today, we’ll talk briefly about how big of a problem cybercrime is and some steps your business can take to keep from becoming a statistic.  (more…)

Read More
There Are A Lot More Scams Than You May Realize

There Are A Lot More Scams Than You May Realize

How many scams and spam messages do you receive on a daily basis? We bet it’s more than you think. Scams affect countless individuals and can cost a pretty penny if they are not handled appropriately. Let’s go over why some individuals might be more likely to fall for scams than others, as well as what you can do to...

Read More
Largest DDoS Attack Ever Thwarted by Cloudflare

Largest DDoS Attack Ever Thwarted by Cloudflare

Continuing their record of the past few months, Cloudflare has stopped yet another DDoS attack—this time, one of record-breaking severity. According to the company, this attack—specifically, an HTTPS DDoS attack—was the largest one ever recorded. Let’s explore what this kind of attack is in the context of what happened, and what you can do to help keep your business safe....

Read More
Cybercrime is Worse Than You Think

Cybercrime is Worse Than You Think

Cybercrime is often thought of as a loner’s game. There is this misconception that all hacks are carried out by hoodie-clad people in dark corners of a room. Nothing could be further from the truth. Today, we will take a brief look at organized cybercrime and why its growth is an ominous sign for businesses. (more…)

Read More
Your Network Has Been Breached. Now What?

Your Network Has Been Breached. Now What?

We like to focus our efforts on preventing data breaches and cybersecurity attacks, but it’s important to know what you should do if you do fall victim to such an attack. Let’s go over how you should respond to a data breach and what you must consider to come out on the successful side of it. (more…)

Read More
The Main Differences Between Hollywood Hackers and the Real Deal

The Main Differences Between Hollywood Hackers and the Real Deal

Technology drives almost everything in modern society, so it’s not a surprise to see hackers being represented in the entertainment we consume. They don’t always get it right, however. In fact, most of the computing constructs demonstrated in entertainment don’t actually exist in real life. This week, we thought we’d briefly discuss the differences between hackers in real life and...

Read More