Category: Security

Pioneers in Tech: Agnes Meyer Driscoll, World War Codebreaker

Pioneers in Tech: Agnes Meyer Driscoll, World War Codebreaker

Cybersecurity is one of the most in-demand career fields today, with nearly 465,000 open jobs in the industry as of October 2021. These positions —cybersecurity analyst, penetration and vulnerability tester, etc.— have their roots in the work of Agnes Meyer...

/ October 22, 2021
DOJ employs False Claims Act to strengthen federal cybersecurity

DOJ employs False Claims Act to strengthen federal cybersecurity

The U.S. Department of Justice is looking to encourage more organizations to beef up their cybersecurity by extending the scope of an existing False Claims Act (FCA) to pursue cases against government contractors that hide a security breach rather than...

/ October 21, 2021
MSPs should revisit best practices to meet guest network needs

MSPs should revisit best practices to meet guest network needs

People expect and demand connectivity everywhere. Free Wi-Fi was once the domain of coffee shops and libraries, but now businesses ranging from rustic campgrounds to hospital waiting rooms must have Wi-Fi on a guest network to keep their customers happy....

/ October 21, 2021
Tech Time Warp: Gone phishing for cybersecurity history

Tech Time Warp: Gone phishing for cybersecurity history

The theme for Week 2 of Cybersecurity Awareness Month is “Phight the Phish!” Arguably one of the most insidious forms of cybercrime, phishing relies on tricking a recipient via social engineering into handing over personal information—and sometimes installing malware in...

/ October 15, 2021
Increase in cyber resiliency is a trend for MSPs to follow

Increase in cyber resiliency is a trend for MSPs to follow

You can fortify your client’s network by installing firewalls, restricting lateral movements, putting MFA and VPNs in place, and implementing training. But sometimes, all the protections in the world aren’t good enough if someone makes a mistake and opens a...

/ October 13, 2021
How hackers use phishing in ransomware attacks

How hackers use phishing in ransomware attacks

Phishing attacks work because people like to click on things. Hackers carefully tailor attacks to their victims by collecting publicly available personal information about them and playing to their sense of urgency to get a response. The attackers only need...

/ October 12, 2021 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Apache Zero-Day Vulnerability Actively Exploited

Cybersecurity Threat Advisory: Apache Zero-Day Vulnerability Actively Exploited

Threat Update There are two vulnerabilities in Apache HTTP Web Server version 2.4.49 that are under active exploitation. The first vulnerability enables an attacker to perform path traversal, file disclosure, and remote code execution (RCE) abilities. The second allows the...

/ October 11, 2021
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: The recent Facebook outage

Cybersecurity Threat Advisory: The recent Facebook outage

On October 4, 2021, the global social network Facebook and its associated platforms faced a global outage that lasted approximately six hours. This outage not only impacted all Facebook users, but it also blocked internal communication between its employees and...

/ October 11, 2021 / 1 Comment
Tech Time Warp: A Sober-ing tale for cybersecurity awareness month

Tech Time Warp: A Sober-ing tale for cybersecurity awareness month

The wriggling saga of the Sober worm is a cautionary tale worthy of a revisit during Cybersecurity Awareness Month. It’s a good reminder that once malware is on the loose, it’s hard to catch—and that it often undergoes a metamorphosis...

/ October 8, 2021 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Twitch.tv Hacked with 125GB of Data Dumped

Cybersecurity Threat Advisory: Twitch.tv Hacked with 125GB of Data Dumped

Threat Update On Wednesday, October 6th, 2021, the streaming platform Twitch confirmed that it had been breached. The party responsible for this attack dumped 125 GB of data to the Internet on Wednesday. The dump contains highly sensitive information for...

/ October 8, 2021