Category: Featured
Voice cloning – a growing cybersecurity threat
Just when you think you’re reasonably on top of all the cyberthreats out there, new ones emerge. Say hello to voice cloning. Or don’t say hello to it because you don’t want a scammer to have your voice. Voice cloning made...
Cybersecurity Threat Advisory: Critical PaperCut vulnerability actively exploited
A new vulnerability, CVE-2023-27350, has been discovered which affects PaperCut MF and NG print management software. Successful exploitation of the vulnerability would allow attackers to access sensitive user information (usernames, email addresses, office/department information, and card numbers) without authentication. A...
Tech Time Warp: Could I have email, texts, and spam, without the spam?
This week’s Tech Time Warp is all about “spam.” Spam can now be used as a noun or verb and even has an adjectival form: “spammy.” And to think, not long ago it was solely canned meat! So how did...
Tech Time Warp: The ANIMAL instinct to do good
If you have ever dabbled in Dungeons & Dragons, you are familiar with the “alignment system,” which is a way to chart characters’ tendency toward good vs. evil as well as their inclination to follow rules (“lawful” vs. “chaotic”). With...
Cybersecurity Threat Advisory: EvilExtractor malware surge detected
EvilExtractor malware has spiked in Europe and the US. EvilExtractor is distributed through phishing campaigns and can harvest various types of data, including browser history, passwords, and cryptocurrency wallets. This is a concern because of the malware’s ability to evade...
The opportunity for managed security services is now
It doesn’t appear that cybersecurity is exempt from a wave of cutbacks that have been made by organizations around the globe, but if there is one bright spot from a managed services perspective, it is that more organizations are relying...
