In the past few weeks, hundreds of WordPress sites have experienced an onslaught of ransomware attacks. The hackers implement encryption notices and demand a ransom of 0.1 Bitcoin, which equates to roughly $5,500 dollars. The hackers include a countdown timer and tell the website owners that they will delete their entire website, which for a… Read more »
Blog
TSA Fights Back Against Wave of Transportation Cyberattacks
The Transportation Security Administration (TSA) recently announced that it will soon implement new cybersecurity requirements on the railroad and airline industries. To many, this comes as no surprise, as critical infrastructure has been subject to a slew of high-profile cybersecurity attacks this past year. The new directives will all but waive existing voluntary cybersecurity measures… Read more »
How Big of a Threat is Killware?
Many cybersecurity experts are now warning of a new ware called killware. Unlike ransomware and malware, which primarily aim to gain money and access to sensitive data, killware’s aim is to take lives. Authorities warn that these types of attacks could impact hospitals, transportation, law enforcement agencies, banks, and even the water supply. Hospitals specifically… Read more »
Will this Streaming Platform Experience another Breach?
In early October, an anonymous 4chan user posted a 125GB torrent link to the 4chan site containing breached data from the popular streaming platform Twitch. The hacker claimed that the intent of the leak was to “foster more disruption and competition in the online video streaming space”, suggesting that the breach was driven by spiteful… Read more »
4 Most Common Mobile Attack Channels that Hackers Use
Cybersecurity Awareness Month 2021: Week 3 Last week, we discussed email phishing and the red flags you need be aware of. This common yet effective method of harvesting personal data laid the foundation for attacks that target mobile devices. Though many people are aware of phishing email campaigns, not the same can be said about… Read more »
Is Your Smartphone Spying on You?
The Rise of End-to-End Encryption: Security Meets Privacy In recent years, end-to-end encryption has risen in popularity as cybersecurity concerns have become more prevalent in popular culture. End to end encryption makes it very difficult for anyone to be able to see messages and platforms like Google, Facebook, and Twitter have taken to implementing this… Read more »
Poly Network Exploited in the Largest Cryptocurrency Hack to Date
Hackers Exploit Poly Network, Stealing Over $600 Million Hackers recently breached Poly Network, a cryptocurrency platform, and stole over $600 million in digital assets. This incident marks the largest crypto hack to date. However, the attack did not compromise blockchain technology itself. Instead, hackers exploited a vulnerability in Poly Network’s system, allowing them to take… Read more »
Senate Approves $1.9 Billion in Cybersecurity Infrastructure Bills
The Rise of Cyber Threats in a Remote Work Era Since the coronavirus pandemic began, remote work has become a major part of the new normal. Cybercriminals have taken advantage of this shift, launching an increasing number of attacks. Large-scale cyberattacks have disrupted critical infrastructure, making systems unusable. Incidents like the SolarWinds hack, JBS hack,… Read more »
Outages Affect Websites from Spotify to the White House
Corporate websites have become a must-have for modern organizations. Corporations, non-profits, and even government bodies maintain websites in order to reach consumers, host information, and provide a means of contact. There are even professionals dedicated to creating content, improving how high a website appears in searches, and maintaining website functionality. Impact of Website Outages When… Read more »
Healthcare’s Struggle with Cybersecurity
The healthcare industry has become more important than ever during the coronavirus pandemic, as the majority of Americans have had to interact with a provider in order to get a coronavirus vaccine, test, or care. This has resulted in an influx of personal medical information to these institutions. That coincided with a global increase in… Read more »