Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Linux Systemd Exploit

Cybersecurity Threat Advisory: Linux Systemd Exploit

What is the threat? A core component in Linux that manages system processes known as “systemd” could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. These vulnerabilities reside in the “systemd-journald” service that...

/ May 23, 2019
Need for zero-trust IT environments bodes well for MSPs

Need for zero-trust IT environments bodes well for MSPs

As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...

/ May 23, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager

Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager

What is the threat? A new, zero-day exploit was discovered targeting several victims in the Middle East and Asia. The vulnerability affects Microsoft Windows and Microsoft server. The Microsoft Windows Kernel Transaction Manager(KTM)is vulnerable to a race condition because it...

/ May 22, 2019
Social engineering: a hacker’s most effective weapon

Social engineering: a hacker’s most effective weapon

What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...

/ May 22, 2019 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Advanced Persistent Threat Activity exploiting MSPs

Cybersecurity Threat Advisory: Advanced Persistent Threat Activity exploiting MSPs

What is the Issue? The National Cybersecurity and Communications integration center identified ongoing APT (advanced persistent threat) attempting to infiltrate networks of managed service providers (MSPs). APT actors are leveraging legitimate credentials to exploit trusted network relationships and allowing these...

/ May 21, 2019
The best defense against ransomware

The best defense against ransomware

Ransomware has been striking businesses of all sizes, including municipalities, impacting their infrastructures. In the past three months, cybercriminals have successfully attacked six major cities. In each case, the attack brought great inconvenience to the victims. The city of Baltimore...

/ May 21, 2019
Worldwide popularity of GDPR on the rise

Worldwide popularity of GDPR on the rise

The first anniversary of a move by the European Union to impose a General Data Protection Rule (GDPR) arrives at the end of this week. GDPR was enacted to protect the digital rights of anyone doing business with a company...

/ May 21, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: HIDDEN COBRA – FASTCash Campaign

Cybersecurity Threat Advisory: HIDDEN COBRA – FASTCash Campaign

What is the Issue? The FBI – in partnership with U.S. government partners, DHS, and Treasury – identified malware and other indicators of compromise (IOCs) used by the North Korean government in an Automated Teller Machine (ATM) cash-out scheme –...

/ May 20, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Access-Token-Harvesting Attack Affects Facebook

Cybersecurity Threat Advisory: Access-Token-Harvesting Attack Affects Facebook

What is the Issue? Many applications typically require an email verification step to authenticate identity before logging the user in. If a person signs up for any app using Facebook Login, an account is created for them, and the authentication...

/ May 19, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Newegg Data Breach Left Customer Credit Cards Exposed

Cybersecurity Threat Advisory: Newegg Data Breach Left Customer Credit Cards Exposed

What is the Issue? The online retailer Newegg confirmed on Wednesday that credit card information from customers had been stolen using a sophisticated attack. Hackers injected 15 lines of card skimming code on the online retailer’s payments page; the code...

/ May 18, 2019