Category: Featured
Cybersecurity Threat Advisory: Critical PaperCut vulnerability actively exploited
A new vulnerability, CVE-2023-27350, has been discovered which affects PaperCut MF and NG print management software. Successful exploitation of the vulnerability would allow attackers to access sensitive user information (usernames, email addresses, office/department information, and card numbers) without authentication. A...
Tech Time Warp: Could I have email, texts, and spam, without the spam?
This week’s Tech Time Warp is all about “spam.” Spam can now be used as a noun or verb and even has an adjectival form: “spammy.” And to think, not long ago it was solely canned meat! So how did...
Tech Time Warp: The ANIMAL instinct to do good
If you have ever dabbled in Dungeons & Dragons, you are familiar with the “alignment system,” which is a way to chart characters’ tendency toward good vs. evil as well as their inclination to follow rules (“lawful” vs. “chaotic”). With...
Cybersecurity Threat Advisory: EvilExtractor malware surge detected
EvilExtractor malware has spiked in Europe and the US. EvilExtractor is distributed through phishing campaigns and can harvest various types of data, including browser history, passwords, and cryptocurrency wallets. This is a concern because of the malware’s ability to evade...
The opportunity for managed security services is now
It doesn’t appear that cybersecurity is exempt from a wave of cutbacks that have been made by organizations around the globe, but if there is one bright spot from a managed services perspective, it is that more organizations are relying...
Tech Time Warp: The USB drive that changed military cybersecurity
Persistent BadUSB-style attacks are nothing new. The spread of malware via USB once caught the U.S. military by surprise, leading to a temporary Army ban on the use of external drives and ultimately the creation of Cyber Command to protect...