9:49 am 22/12/20

Different Ways to be a Ransomware Victim, and How to Avoid Them


"Ransomware is once again in the news. Attackers are reportedly targeting health care providers and are using targeted phishing campaigns disguised as meeting invites or invoices that contain links to Google documents, which then lead to PDFs with links to [...]

Different Ways to be a Ransomware Victim, and How to Avoid Them2020-11-19T12:44:10-04:00
2:51 pm 02/12/20

Cyberattack Attribution Pitfalls


"Attack attribution is always difficult as criminal groups often share code and techniques, and nation-state actors excel at deception. Here, security researchers share their techniques and common pitfalls. Attributing cyberattacks to a particular threat actor is challenging, particularly an intricate [...]

Cyberattack Attribution Pitfalls2020-10-20T14:54:16-04:00
4:54 pm 04/08/20

VoIP & Unified Communications Attacks on the Rise


Businesses use on-prem and cloud-based unified communications (UC) to connect distributed workforces but often don’t realize the security threats hidden within popular UC services, but they should, and they should address them. There has been a sharp rise in eMeetings, [...]

VoIP & Unified Communications Attacks on the Rise2020-08-31T12:16:19-04:00
8:56 am 27/04/20

Beaumont Breach Puts 112k at Risk


The personal information 112,000 people who were treated at Beaumont Health was potentially compromised in a phishing email data breach that dates back nearly a year, the state's largest hospital system announced Friday... Read the article here. What do you [...]

Beaumont Breach Puts 112k at Risk2020-08-31T12:22:07-04:00
Go to Top