Cybersecurity

How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

How to Mitigate Malicious OneNote Attacks and the Indicators of Compromise

This post is a continuation of the other post, Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks, which shows how a malicious…

Read more
Malicious-One-Note-Files-Insta

Malicious One Note Files are Being Used in Attempts to Gain Initial Access to Victim’s Networks.

As of Februrary 2023, numerous instances of malicious Microsoft OneNote files (.one) have been detected and stopped from being used to obtain intial access to victims by BlackpointCyber's SOC with…

Read more
Eagle-Eye-T-Who-Is-The-Cl0p-Ransomware-Group

Who Is The Cl0p Ransomware Group?

The Cl0p ransomware gang is a notorious cyber criminal gang that is known for deploying ransomware attacks. They are associated with the deployment of sophisticated ransomware attacks. These attacks involve…

Read more
Huntress-demonstrates-MOVEit-Transfer-Zero-Day-Vulnerability-Instagram

Huntress demonstrates MOVEit Transfer Zero Day Vulnerability

In this video we can see the huntress team able to recreate the MOVEit zero day vulnerability CVE-2023-34362. Please visit the Vendors website to ensure you get the latest updated…

Read more
Windows 11 Security Tips, Keeping You Safe

Windows 11 Security Tips, Keeping You Safe

In this post we will look at some basic security mechanisms that you can use to help keep you safe from online threats. General Security Tips Be careful when connecting…

Read more
Exploitation of Critical MOVEit Transfer Vulnerability Observed By Rapid7

Exploitation of Critical MOVEit Transfer Vulnerability Observed By Rapid7

In the post regarding the initial MOVEit Transfer vulnerability Rapid7 is seeing exploitation of 3 vulnerabilities in MOVEit Transfer software. The first vulnerability was given a CVE on June 2nd…

Read more

Australian Scamming Victims Meet with Government Officials

In this 2nd part to my other post regarding scammers taking millions from Australians, we see some of the scamming victims meet with government officials who are not aware of…

Read more
3 Types of Data Protection

3 Types of Data Protection and the Difference Between Data Privacy and Data Security

In this post we will look at the 3 types of data protection as well as look at the difference between data protection and data security.   3 Types of…

Read more
What is Data Privacy and Why is IT Important?

What is Data Privacy and Why is Data Privacy Important?

Data Privacy Defined Data privacy is the ability for one to control how, what, and where our personal or confidential information is gathered, stored or shared. This was important way…

Read more
How to Prevent a Cyber Attack

How to Prevent a Cyber Attack

An organization is never 100% safe from a cyber attack. The more you education your employees on what to be vigilant for and how to practice creating secure passwords, the…

Read more