Phew! Hackers are Hard at Work! Just in the past few days, it has been revealed that Discord.io has been hacked, and the data of 760,000 users was put up for sale on the darknet. Not only that, hackers have leaked personal identifiable information (PII) data and photos of patients from a Brazilian plastic surgery …
Category Archives: Cyber Security
Gone Phishing
Phishing Attacks are Very Common A surefire way to get into an organization’s network that works is with phishing emails. Nearly 91% of cyberattacks begin with phishing emails, and more than 80% of reported security incidents in 2021 were phishing attacks. According to a 2021 report by CISCO, nearly 90% of data breaches occur due …
Scary Cyber Stats
Scary cyber stat: 87% of businesses hit by this in the last year You may think that cyber attacks only happen to large corporations. But unfortunately, that’s not the case. According to a recent report, almost two-thirds of small and medium-sized businesses (SMBs) suffered at least one cyber attack over the past year. That’s a …
Phishing Attacks Latest Trend
What’s a Picture Worth? A picture is worth a thousand words, right? What if the picture is worth more than a thousand dollars–in damages? What if the picture you’re emailed and clicking on is a cute and cuddly kitten or puppy? Or what if it’s a deal so good it’s too good to be true? …
Storm-0558 Hack of Microsoft
China-Based Hackers Breach Email Accounts of Western European Government Agencies and Beyond In today’s interconnected world, where technology plays an integral role in our daily lives, cybersecurity has become paramount. However, even with robust measures in place, determined hackers manage to exploit vulnerabilities, causing havoc and reminding us of the ever-present dangers. The recent Storm-0558 …
The Continuing Effects of the CLOP Ransomware Attack
The Continuing Effects of the CLOP Ransomware Attack on US Organizations In May 2023, the Clop ransomware group exploited a vulnerability in the MOVEit Transfer file transfer software to gain access to and steal data from a number of US organizations. The group then began threatening to release the stolen data if the organizations did …
Continue reading “The Continuing Effects of the CLOP Ransomware Attack”
The Clop Cyberattack
The Clop Cyberattack: Unmasking the Devastating Cyber Threat Introduction In recent years, the world has witnessed a surge in cyber threats targeting organizations across various sectors. One such malicious attack that shook the United States and made headlines globally is the Clop cyberattack. With its sophisticated techniques and widespread impact, the Clop ransomware attack has …
Business Email Compromise (BEC) Attack
Business Email Compromise (BEC) Attack What is a business email compromise (BEC) attack? A business email compromise (BEC) attack is a type of cyberattack that targets businesses by sending fraudulent emails that appear to be from a legitimate source. The goal of a BEC attack is to trick the recipient into providing sensitive information, such …
Data at Risk
Is your business data at risk? Don’t take chances with old tech! When you replace old computers or external drives, do you delete the data and then just get rid of them? Without knowing it, you could be putting your sensitive data at risk. A new study by a data recovery specialist shows that millions …
MFA Fatigue
While you were sleeping… MFA Fatigue No, it’s not the 1995 romcom about miscommunications and star-crossed lovers. It’s the reality that can happen while you are sleeping or simply just sleepy. Have you ever felt frustrated by the flood of notifications from your multi-factor authentication (MFA) app? Especially when you’re just about to fall asleep? …