Targets of ransomware rarely publicly acknowledge attacks. More openness would help everyone. Ransomware is one of the most significant cybersecurity issues we face, as cyber criminals hack into businesses, schools, hospitals, critical infrastructure and more, in order to encrypt files and demand a ransom payment for the decryption key. Despite warnings not to, many victims pay […]
Even if you don’t want iOS 16 yet, updating to iOS 15.7 is still a very good idea to fix security flaws. The iOS 16 update became available on September 12th for the iPhone 8 and newer, changing just about every app or screen of the mobile operating system. Apple iOS/iPadOS 15 and macOS Big […]
A vulnerability in the TikTok app for Android could have let attackers take over any account that clicked on a malicious link, potentially affecting hundreds of millions of users of the platform. Details of the one-click exploit were revealed in a blog post from researchers on Microsoft’s 365 Defender Research Team. The vulnerability was disclosed to TikTok […]
LastPass started notifying their users of a recent security incident where an “unauthorized party” gained access. The malicious hacker used a compromised developer account to gain access to parts of the password manager’s source code and some proprietary LastPass technical information. In a letter to LastPass users, the company’s CEO Karim Toubba explains that its investigation […]
The USB Rubber Ducky is back with a vengeance. The much-loved hacking tool created byDarren Kitchen, was released to coincide with this years Def Con hacking conference. It was found that the latest editionhas a new features and is more dangerous than ever. What Is It? To the human eye, the USB Rubber Ducky looks like […]
Over 130 organizations, including Twilio, DoorDash, and Cloudflare, have been compromised by hackers as part of a months-long phishing campaign,security researchers call “0ktapus.” According to a report from cybersecurityGroup-IB, login credentials belonging to nearly 10,000 individuals were stolen by attackers who imitated the popular single sign-on service Okta. Attackers then used that access to pivot and attack […]
Cyber security awareness: Unfortunately, small to medium sized businesses make very tempting targets for malicious hackers because they leave themselves vulnerable to cyber threats. SMBs hold the same kinds of data that large businesses have, such as personal information, credit card details, passwords, and more. However, with the nature of SMBs means the information could be […]
Learn how to boost your mobile security and protect your digital identity. This tech blog will run through different forms of malicious software on your iOS or Android handset, the warning signs of a spyware infection, and how to remove such pestilence from your mobile devices if it is possible to do so. The emails […]
Keeping on top of cybersecurity risks is a constant challenge. Threats including phishing, malware and ransomware are continually evolving and adapting, as cyber criminals regularly find new, innovative ways to conduct malicious hacking campaigns, break into computer systems and find a way to stay there. Many companies are having difficulties keeping up with the technological world and threats that come with […]





