Beware of Elaborate Phishing Attacks Targeting Apple Users

Posted by - April 04, 2024

Reports have surfaced detailing a sinister phishing campaign that leverages what appears to be a flaw in Apple’s password reset mechanism. Victims find themselves bombarded with a barrage of system-level prompts, rendering their devices virtually unusable until they respond to each prompt with either an “Allow” or “Don’t Allow.” This inundation tactic, dubbed “push bombing”… Read more »

Refresh Your Digital Space: 4 Essential IT Spring Cleaning Tips

Posted by - March 26, 2024

Since many of us spend as much time online as we do offline, it’s just as important to fresh your digital space as it is your physical space. Just like decluttering your home, organizing your digital space can boost efficiency, productivity, and even cybersecurity. Below are four tips to help you jump into your virtual… Read more »

Critical Vulnerabilities Found in WordPress Plugins Put Thousands of Websites at Risk

Posted by - March 20, 2024

Is your organization’s website hosted on WordPress? According to a recent discovery by the Wordfence team, your site may be at risk. The Wordfence team at WordPress security company Defiant have unveiled critical vulnerabilities in two discontinued MiniOrange plugins, as well as another concerning flaw in the widely-used RegistrationMagic plugin. These vulnerabilities pose significant risks… Read more »

Crypto Imposters are Using Calendly to Spread Mac Malware

Posted by - March 19, 2024

Do you use Calendly to organize your calendar and book meetings? You may be vulnerable to a new scheme targeting Mac users. Recently reported by Krebs On Security, this scheme targets people in the cryptocurrency space through platforms like Calendly via malicious links and calendar add-ons. One victim’s experience illustrates the danger: approached via Telegram… Read more »

Protecting Your Business: Unmasking the Most Common Scam Calls

Posted by - February 20, 2024

Following the recent viral story of the woman who lost $50,000 to a phone scam, the discourse surrounding scam prevention has been renewed. Unfortunately, stories like these are becoming increasingly common and are not only detrimental to individuals – but can be to businesses as well. Below are five of the most common scam calls… Read more »

Are Longer Passwords Safer Against Cyber Attacks?

Posted by - February 05, 2024

A 16-character password may be just as susceptible to a hacking attempt as a short password, according to a recent Specops Software report. Using easily guessable, duplicate, and simple passwords may make it easier for you to remember, but it also makes it easier for hackers to hijack your accounts. With a booming market for… Read more »

Microsoft’s Response to Midnight Blizzard Data Breach

Posted by - February 02, 2024

Immediate Response and Detection On Friday Microsoft released an official statement on its actions following a cyber breach by Nation State Actor Midnight Blizzard against its corporate systems. This breach raises concerns about the ongoing threat from nation-state actors and highlights potential shortcomings in Microsoft’s cyber practices. Common issues such as poor password management and… Read more »

Can Hackers Still Bypass 2FA?

Posted by - January 10, 2024

Despite having 2FA enabled, Mandiant, a Google-owned company, was recently the victim of a cyber-attack against their Twitter account with over 100,000 followers. To appear more legitimate, the hackers renamed the account “Phantom” and updated the bio to pose as the Phantom Cryptocurrency wallet. The hackers then used the account to promote links to a… Read more »

Ransomware: Why You Shouldn’t Pay to Get Data Back

Posted by - December 28, 2020

Ransomware attacks have been on the rise for years.  The software necessary for these attacks are more sophisticated, anonymous currencies like Bitcoin are more prevalent, and companies are collecting more data, creating a perfect storm for bad actors looking to make money off of security lapses.  These scams take several forms.  The group could lock… Read more »

Twitter Hack Exposes High-Profile Accounts: What You Need to Know

Posted by - August 04, 2020

Twitter has finally disclosed details about the major cybersecurity breach that occurred in July 2020, where high-profile accounts were compromised and used to promote cryptocurrency scams. Who Was Affected? The attack targeted some of the most well-known figures in the world, including: Amazon CEO Jeff Bezos Tesla CEO Elon Musk Microsoft Co-Founder Bill Gates Former… Read more »