
Social Engineering on Social Media
Being socially engineered on a professional social media platform? It’s more likely than you think! Most of us are familiar with the typical types of scams that occur on social media platforms,...
Being socially engineered on a professional social media platform? It’s more likely than you think! Most of us are familiar with the typical types of scams that occur on social media platforms,...
Smartphones, tablets and other mobile devices have become ubiquitous in our society over the past few decades, leading to a world where many of us have one in our possession at all times. The sheer...
On July 2nd 2021, the threat group REvil launched a targeted attack against the users of the Kaseya VSA product, a remote monitoring and management (RMM) tool many organizations and MSPs leverage to...
As always, World Password Day is a great time to review our personal password management and hygiene practices to ensure we are safely and securely interacting with internet connected platforms and...
Every week, we see more and more headlines about websites and services being hacked and their data being breached. This week alone, more than 23 million records for over 66,000 users were leaked...
It’s 3:41 a.m. on a Tuesday and the phone rings. You answer, wiping the sleep from your eyes, and are greeted by one of your security analysts telling you, “We have an active, organization-wide...
It’s 2020, do you know where your vulnerabilities are (and when they’ll get patched)? There have been several high-profile vulnerabilities in the news recently, like Microsoft’s wormable DNS...
Virtual collaboration is nothing new, but the current coronavirus outbreak has significantly increased the need at organizations for remote tools. Companies are coping with the migration of their...
It may be a new year, but 2020 didn’t wait long to remind us that it’s still business as usual in the world of critical security vulnerabilities. January already saw critical vulnerabilities in a...
A Cybersecurity Labor Shortage Continues The increased prevalence of data theft and security breaches across almost all industries continues to show that threat actors are becoming more pervasive and...
If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used...
Phishing isn’t really a new threat – it’s something that has existed in many forms since the very beginnings of commercial availability of e-mail. By all rights, it’s truly just an extension...