Month: April 2019
Cybersecurity Threat Advisory: Windows Desktop Shortcut Hijack
What is the Issue: Security researchers have discovered a new attack technique utilizing Microsoft Word, macros and your desktop shortcuts. Utilizing a malicious macro embedded within a Word document, desktop shortcuts are modified to download malware when you click on...
Cybersecurity Threat Advisory: Unprotected Marketing Database Exposes PII
What is the Issue? On June 27th, an unprotected database belonging to a marketing firm containing 340 million records exposed to the internet was discovered. The database was found by an independent research firm. Why is this noteworthy? The unprotected...
Tech Time Warp: The hidden surprises of technology Easter eggs
Have you ever typed “answer to life, the universe, and everything” into Google? In a nod to The Hitchhiker’s Guide to the Galaxy, Google returns “42” as a calculator result. Or perhaps you’ve noticed a white X in front of...
MSPs can use their skills to give back to the community
Earlier this month, I got word that a local company I hadn’t heard of was doing an electronics recycling day. It’s the type of thing where you bring in your old computers, external hard drives, and other things like that,...
Cybersecurity Threat Advisory: Necurs Malware Bypassing Conventional Detection Methods
What is the Issue? It has been discovered by Trend Micro that the Necurs malware, which was previously revealed as an internet shortcut, has now been found under the veil of the internet query file. These files innocently and typically...
Sizing up the scope of the 5G networking opportunity for MSPs
There’s a lot of buzz and excitement these days around 5G wireless networks. Over the next several years, the availability of more bandwidth will drive adoption of a variety of emerging use cases. These use cases will involve everything from...
Cybersecurity Threat Advisory: Mylobot Malware Brings New Sophistication to Botnets
What is the Issue? Researchers have discovered a New Windows malware whose origin traces back to the ‘Dark Web.’ The malware, dubbed Mylobot, pulls together a variety of strategies and techniques to gain a foothold on its targets and remain...
Wipro breach and how MSPs can avoid the same fate
Wipro, one of India’s largest and most successful MSPs, recently fell victim to a hack that was accomplished via a phishing campaign. After gaining entry to Wipro’s network “for some time,” the hackers were able to launch cyber attacks against...
Human vulnerability is the biggest cybersecurity threat
The culture of cybersecurity has been training its weapons in the wrong direction, according to Dr. Arun Vishwanath, the chief technologist at Avant Research Group and a former professor at the University at Buffalo. While ransomware, spearphishers, and general hackers...
Cybersecurity Threat Advisory: MacOS Bypass Flaw Lets Attackers Sign Malicious Code as Apple
What is the Issue: Due to a flaw in Apple’s code-signing API, hackers have been able to manipulate the code-signing process to enter malicious code into MacOS systems. Third-party security tools were unable to detect the issue as the malicious...