Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on...
Blog
Hackers Execute Arbitrary Code with Microsoft Office
According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on...
Malicious SEO Campaign Affects Thousands of Sites
In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As a result, almost 15,000 sites...
Phishing Kit Targets US Shoppers
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and...
Lenovo Patches Critical Security Flaws
Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers...
DuckDuckGo Releases App Tracking Protection Beta for Android
The feature is comparable to Apple's 'App Tracking Transparency. However, unlike Apple, DuckDuckGo's method does not rely on app developers' compliance with user choice. All...
How To Develop Accountability In Remote Workers
Accountability can be a tricky thing when it comes to your remote employees. It's something that even seasoned managers struggle with. If that's the boat you find yourself in,...
Bypass Android Lock Screen on Pixel and Other Devices
David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel 6 and Pixel 5 devices, allowing anybody...
Recent Growth of Fake LinkedIn Accounts
According to a KrebsOnSecurity article, the recent growth of phony LinkedIn accounts is causing an identity crisis for the business networking site and organizations that rely on...
Implementing SSO in Your Business
When you're a business owner, you always look for ways to streamline processes and improve efficiency. A single sign-on (SSO) system is a great way to simplify authentication. It...
SaaS Phishing Attacks Are Increasing
It's getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto...
VoIP Features Enhance Customer Experience
There are many reasons why staff may be required to put customers on hold. However, Voice-over Internet Protocol (VoIP) technology can be utilized to ensure that callers do not...
The Rise of Encryption in Businesses
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it....
Hundreds of U.S. News Outlets Affected by Malware
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates...
New Microsoft Report Details Latest Cybersecurity Threats
According to Microsoft's latest announcement, businesses should assess security measures to defend against evolving cyber-security threats. Microsoft released its Digital Defense...
Zoom Unveils New Productivity Tools
While holding its Zoomtopia event on November 8, 2022, the video conferencing giant announced the release of two brand-new productivity tools for Zoom users. In addition to the...
Attacks on Business VPNs are Increasing
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and...
Dropbox Suffers Major Breach in Phishing Attack
It's no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was...
SIM Swap Attack Targets Verizon Customers
Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon's prepaid...
Benefits of Having a Dual Monitor Setup for Your Business
In recent years, the use of advanced technology in the office has increased in popularity among businesses to improve their efficiency, productivity, and effectiveness. Whether...