Category: Security

The Creeper and the Reaper make cybersecurity history
“I’M THE CREEPER. CATCH ME IF YOU CAN.” This eerie message is the equivalent of “hello, world!” in cybersecurity history. In 1971, Bob Thomas, an engineer at BBN Technologies in Cambridge, Massachusetts, developed the first computer worm, dubbed the “Creeper.”

Cybersecurity Threat Advisory: Cyber Threats Affecting U.S.A Presidential Election
Advisory Overview With the United States Presidential Election coming up, cyber-criminal and hacktivist activity has grown. Recent phishing and disinformation campaigns may pose a threat to the election’s validity on a large scale, as well as voter personal identifiable information...

Ask an MSP Expert: Overcoming human error to secure the cloud
Data breaches in the cloud are becoming more common, impacting industry giants and small players alike, and MSPs now have to dig deeper to prevent them.

Pioneers in Tech: Becky Bace, the “Den Mother of Computer Security”
Picture a “cybersecurity expert” in your mind, and then catch yourself if you imagine a stereotype. Not every cybersecurity expert is a white male—as proven by the influence and impact of Rebecca “Becky” Bace, an intrusion detection pioneer who passed...

Cybersecurity trends to know in 2020
Cybersecurity is one of the major constants in our 21st century lives. However, did you know that one of the world’s first laws designed to fight malicious internet activity was passed in 1990? The United Kingdom’s Cybersecurity Misuse Act preempted...

Email threat types: Malware
Email attacks often come in the form of a harmless-looking email with malware attached as a .zip file or embedded in an email attachment. This malware could install ransomware, spyware, and other damaging programs. Malware is short for ‘malicious software’ and...

Cybersecurity Threat Advisory: Universal Health Services Infected with Ryuk Ransomware
Advisory Overview Earlier this week, Universal Health Services (UHS) suffered a ransomware attack that took down data networks at multiple facilities across the United States, wherein systems were crippled, antivirus software was maliciously disabled, many patients had to be relocated,...

Tech Time Warp: National Cybersecurity Awareness Month turns 17
For the past 17 years, the Cybersecurity & Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) have used the month of October to educate Americans about the importance of good cybersecurity habits. Much has changed since the...

Zero-day attacks wreak havoc on notable targets
Some major brands have been rocked by zero-day attacks and vulnerability discoveries in recent weeks. A popular plug-in for WordPress is the subject of a zero-day vulnerability that may expose more than 700,000 sites to malicious exploit. The WordPress File...

Cybersecurity Threat Advisory: Increased Attack Activity of Trickbot Variant
Advisory Overview The SKOUT Security Operations Center has recently observed an uptick in attack activity involving an emerging Trickbot variant known as Bazar Backdoor. Trickbot is a banking trojan and information stealer that has evolved over the years to fill...