Cybersecurity

Vendor-Email-Compromise

FAQ – Vendor Email Compromise, What Is It?

References: https://ironscales.com/glossary/vendor-email-compromise Vendor Email Compromise - How Does It Work? VEC usually starts with a malicious threat actor that gains access to a vendors email account. This is usually done…

Read more
How Can MSP’s Address Vulnerabilities?

FAQ – How Can MSP’s Address Vulnerabilities?

Jonathan "Sauce" Marinaro from Celerium Cyber Defense discusses how MSPs can address zero-day vulnerabilities. https://youtube.com/watch?v=7Gk5T6Z8g8w

Read more
Cybersecurity-Importance-and-Functionality

FAQ – What Is Cyber Security? Why Is It Important & How Does It Work?

What Is Cybersecurity? The practice of safeguarding computers, networks, software applications, critical systems, and data from any malicious threat actors is known as cybersecurity. It is a businesses responsibility to…

Read more
Vendor-Security-Best-Practices

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security Best Practices

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Vendor-Security

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Highest-Levels-Of-Cyber-Attacks

Education & Research Sector Sees Highest Levels Of Cyber Attacks

With the education and research sectors being the early adopters of digital platforms for delivery of course material and conducting exams, digital transformation has been an on going process for…

Read more
Exfiltrated-In-Hack

All Of Okta’s Client Data Exfiltrated In Hack

Okta has admitted that it has greatly messed up when investigating last month's hack. It failed to pick up that 99% of its data had been exfiltrated by threat actors.…

Read more
Okta 2fa

Okta Hacked Again As a 2FA Company Fails To Enforce 2FA

Okta is back in the headlines, this time due to not implementing 2FA for employee accounts. 2FA is something that is a crucial must have today and for all accounts…

Read more
GPS Spoofing: Aircraft Being Hacked When Flying Over The Middle East

GPS Spoofing, Aircraft Being Hacked When Flying Over The Middle East

In recent and alarming developments, dozens of commercial flights that are flying over parts of the Middle East reporting experiencing GPS spoofing attacks in recent months. Such attacks deal with…

Read more
Top-Ransomware-Threats-Of-2023

Top Ransomware Threats Of 2023

In this post we will list the top 5 ransomware strains of 2023. Lockbit AlpVM CLOP Royal BlackBasta Now that 2024 has started, the Lockbit ransomware strain is still at…

Read more