Results for: ransomware
KeRanger brings ransomware to the Mac
Not too long ago one of the benefits of using a Macintosh for work was that there wasn’t enough of these systems in place to make it worthwhile for hackers to target them. Fast forward to today, and the growing...
MSPs are on the front lines of fighting deepfakes
Alarm bells went off in board rooms and C-suites across the globe last fall when an executive at a Hong Kong company was duped by deepfakes into wiring $25 million to criminals. According to CNN: A finance worker at a...
Threat Spotlight: The remote desktop tools most targeted by attackers in the last year
Remote desktop software allows employees to connect into their computer network without being physically linked to the host device or even in the same location. This makes it a useful tool for a distributed or remote workforce. Unfortunately, remote desktop...
New CISA vulnerability warning pilot program is a success
The Cybersecurity and Infrastructure Security Agency (CISA) recently announced its vulnerability warning program has issued over 2,000 alerts since its inception. The agency’s director, Jen Easterly, delivered remarks recently at the Institute for Security and Technology, sharing that these alerts...
Killware: The emerging cyberthreat
Given the surge of incidents within the past decade, many people are becoming familiar with ransomware and data breaches. However, a new type of cyberattack known as killware has emerged in recent years. It’s now a major security issue for organizations....
Predictions from Barracuda’s security frontline to keep an eye on
Predicting the future is difficult, but you can anticipate what is likely to happen by looking at how things have evolved over time. Barracuda asked colleagues who work on the security frontline, from XDR and offensive security to international product...
Tech Time Warp: The breakthrough against software piracy that wasn’t
In this edition of Tech Time Warp we go back to April 14, 1995, when the Chinese government began widespread efforts to stop its government agencies from using pirated software. The move came after a Feb. 27, 1995, accord agreement...
Cybersecurity Threat Advisory: Active exploit of Atlassian Confluence
This Cybersecurity Threat Advisory details the exploitation of the critical vulnerability CVE-2023-22518 in the Atlassian Confluence Data Center and Server. Attackers are deploying a Linux variant of Cerber (aka C3RB3R) ransomware. This allows unauthenticated attackers to reset Confluence and create...
QR code phishing: What MSPs need to know to protect their customers
In today’s digital age, the use of technology continuously evolves to make our personal and professional lives more convenient. Quick Response (QR) code has been one such advancement. This two-dimensional barcode allows users to share website URLs and contact information...