Cybersecurity

How Can MSP’s Address Vulnerabilities?

FAQ – How Can MSP’s Address Vulnerabilities?

Jonathan "Sauce" Marinaro from Celerium Cyber Defense discusses how MSPs can address zero-day vulnerabilities. https://youtube.com/watch?v=7Gk5T6Z8g8w

Read more
Cybersecurity-Importance-and-Functionality

FAQ – What Is Cyber Security? Why Is It Important & How Does It Work?

What Is Cybersecurity? The practice of safeguarding computers, networks, software applications, critical systems, and data from any malicious threat actors is known as cybersecurity. It is a businesses responsibility to…

Read more
Vendor-Security-Best-Practices

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security Best Practices

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Vendor-Security

Vendors Staying Secure Is Key To Preventing Future Data Breaches – Vendor Security

It is important that the right steps are taken to prevent a breach from taking place. Sadly there are alot of weak links in the cyber security infrastructure that increases…

Read more
Highest-Levels-Of-Cyber-Attacks

Education & Research Sector Sees Highest Levels Of Cyber Attacks

With the education and research sectors being the early adopters of digital platforms for delivery of course material and conducting exams, digital transformation has been an on going process for…

Read more
Exfiltrated-In-Hack

All Of Okta’s Client Data Exfiltrated In Hack

Okta has admitted that it has greatly messed up when investigating last month's hack. It failed to pick up that 99% of its data had been exfiltrated by threat actors.…

Read more
Okta 2fa

Okta Hacked Again As a 2FA Company Fails To Enforce 2FA

Okta is back in the headlines, this time due to not implementing 2FA for employee accounts. 2FA is something that is a crucial must have today and for all accounts…

Read more
GPS Spoofing: Aircraft Being Hacked When Flying Over The Middle East

GPS Spoofing, Aircraft Being Hacked When Flying Over The Middle East

In recent and alarming developments, dozens of commercial flights that are flying over parts of the Middle East reporting experiencing GPS spoofing attacks in recent months. Such attacks deal with…

Read more
Tor-Project

Tor Project Removes Relays Due to For Profit Risky Activity

The tor project explained why a number of network relays were removed citing that they represented a threat to the safety & security of all Tor network users. The tor…

Read more
Tirada-Malware

Dissecting The Tirada Malware Trojan

Trojans are similar to that of armies and actually behave in the same way. Armies usuallly send out the scouts first to survey the area and ensure all is ok.…

Read more