Category: Security

Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: RogueRobin Advanced Malware

Cybersecurity Threat Advisory: RogueRobin Advanced Malware

What is the threat? Cyber researchers have recently found that there’s a custom-developed malware known as RogueRobin which uses multiple techniques to upload and download files to/from affected host(s). It was reported that the cyber threat adversary, DarkHydrus, is responsible...

/ May 26, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Cisco Flaw Leaves Networks Wide Open

Cybersecurity Threat Advisory: Cisco Flaw Leaves Networks Wide Open

What is the threat? Security researchers identified a critical and unpatched vulnerability (CVE-2018-15439) in the widely deployed Cisco Small Business Switch Software that could allow a remote attacker to bypass security restrictions and gain full admin access. The default configuration...

/ May 25, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Global DNS Hijacking Campaign

Cybersecurity Threat Advisory: Global DNS Hijacking Campaign

What is the threat? Organized cyber attackers have hijacked many Domain Name Servers (DNS) and manipulated them in ways which allow them to redirect traffic to/from a victim network and harvest usernames, passwords, and domain credentials for organizations which they...

/ May 24, 2019
Tech Time Warp: Prince Philip’s inbox gets hacked

Tech Time Warp: Prince Philip’s inbox gets hacked

Harry and Meghan might grab headlines for their privacy settlements and use of social media, but the younger royals are hardly breaking new ground. You might say they’re just following in the family’s footsteps. In 1985, two hackers were arrested...

/ May 24, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Linux Systemd Exploit

Cybersecurity Threat Advisory: Linux Systemd Exploit

What is the threat? A core component in Linux that manages system processes known as “systemd” could allow unprivileged local attackers or malicious programs to gain root access on the targeted systems. These vulnerabilities reside in the “systemd-journald” service that...

/ May 23, 2019
Need for zero-trust IT environments bodes well for MSPs

Need for zero-trust IT environments bodes well for MSPs

As part of a concerted effort to improve their overall cybersecurity posture, most organizations are now moving towards building a true zero-trust IT environment. After years of pursuing a hodgepodge approach to IT, organizations are starting to realize that a...

/ May 23, 2019
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager

Cybersecurity Threat Advisory: Zero Day in Windows Kernel Transaction Manager

What is the threat? A new, zero-day exploit was discovered targeting several victims in the Middle East and Asia. The vulnerability affects Microsoft Windows and Microsoft server. The Microsoft Windows Kernel Transaction Manager(KTM)is vulnerable to a race condition because it...

/ May 22, 2019
Social engineering: a hacker’s most effective weapon

Social engineering: a hacker’s most effective weapon

What is the weakest link in your client’s network? It’s not unpatched software (although you should patch) or the unimaginative passwords (although you should change it). The weakest links are humans themselves. It’s Joan in accounting or Stan in human...

/ May 22, 2019 / 1 Comment
Cybersecurity Threat Advisory
Cybersecurity Threat Advisory: Advanced Persistent Threat Activity exploiting MSPs

Cybersecurity Threat Advisory: Advanced Persistent Threat Activity exploiting MSPs

What is the Issue? The National Cybersecurity and Communications integration center identified ongoing APT (advanced persistent threat) attempting to infiltrate networks of managed service providers (MSPs). APT actors are leveraging legitimate credentials to exploit trusted network relationships and allowing these...

/ May 21, 2019
The best defense against ransomware

The best defense against ransomware

Ransomware has been striking businesses of all sizes, including municipalities, impacting their infrastructures. In the past three months, cybercriminals have successfully attacked six major cities. In each case, the attack brought great inconvenience to the victims. The city of Baltimore...

/ May 21, 2019