Cyber Threats December 21, 2020 More Than 3 Million Chrome and Edge Users Have Malware-Infected Browser Extensions Approximately 3 million users of Google Chrome and Microsoft Edge have been infected with malware that has been hidden in browser extensions, according to a ... Read more
Security Breaches December 18, 2020 Microsoft and the U.S. Nuclear Agency Confirmed as Victims of SolarWinds Hack The number of confirmed victims of the SolarWinds hack is growing. Microsoft has confirmed it was hacked, although its software was not apparently compromised. Reuters ... Read more
Cyber Threats December 18, 2020 Contact Form 7 Vulnerability Places 5 Million WordPress Sites at Risk of Takeover A critical vulnerability has been identified in the popular WordPress plugin, Contact Form 7, which has been installed on approximately 5 million websites. The vulnerability, ... Read more
Insights December 17, 2020 Email Backup & Email Archiving Small business email backup and email is vital due to federal and state laws which require businesses to keep email information for established times of ... Read more
Insights December 17, 2020 Email Archiving Policy In several regulated industries, an email archiving policy is necessary to show the company is complying with industry standards. Even if a company does not ... Read more
Insights December 17, 2020 Email Archiving Software The setup of protected Email Archiving Software may be of significant advantage to a company which is operating in a regulated business, managing a huge ... Read more
Insights December 17, 2020 Office 365 Email Archive Solutions If your small business is in a regulated market and you use Microsoft Office 365 email archive solutions you have to be aware that this ... Read more
Insights December 17, 2020 Cloud Based Email Archiving The simplest, most granular and safe choice for archiving emails and ensuring legal as well as compliance obligations are met will be the setup of ... Read more
Insights December 17, 2020 Email Archiving Services Supplied as software-as-a-service (SaaS) so as to guarantee eDiscovery, litigation support, and regulatory compliance, business continuity, storage management, and then disaster recovery – an email ... Read more
Insights December 17, 2020 Email Archive Appliance When a lot of individuals really think regarding} archiving, they picture an email archive appliance – a locally-installed hardware solution focused on archiving emails using ... Read more
Insights December 17, 2020 Email Archiving Regulatory Compliance Summarised Email retention laws and regulations in the United States call for business enterprises to keep duplicates of all email messages for many years, in case ... Read more
Trends & Reports December 17, 2020 Researchers Find More than 45 Million Medical Images Stored on Unprotected Servers More than 45 million medical images are currently exposed on unprotected servers and can be accessed freely over the internet without usernames or passwords. The ... Read more
Cyber Threats December 15, 2020 Document Delivery Lure Used in Large Scale Spear Phishing Campaign Targeting Enterprise Employees Last week, researchers at Abnormal Security identified a coordinated phishing attack targeting enterprise employees that attempts to steal their Microsoft Office 365 credentials. The emails ... Read more
Security Breaches December 15, 2020 SolarWinds Supply Chain Attack Impacts up to 18,000 Customers Hackers successfully compromised the SolarWinds Orion software solution and incorporated a backdoor dubbed SUNBURST that has been downloaded by up to 18,000 of its customers, ... Read more
Tools & Practices December 11, 2020 K-12 Schools Warned About Cyber Actors Targeting Distance Learning Education The U.S. Cybersecurity and infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have issued ... Read more
Cyber Threats December 10, 2020 Spear Phishing Campaign Spoofing Microsoft.Com Sees Emails Delivered to Office 365 Inboxes Researchers at Israeli cybersecurity firm Ironscales have identified a spear phishing campaign targeting Office 365 users that spoofs the Microsoft.com domain. Several thousand Office 365 ... Read more
Security Breaches December 9, 2020 FireEye Discloses Data Breach and Confirms Theft of Red Team Tools The U.S. cybersecurity firm FireEye has announced a sophisticated threat actor has successfully hacked into its systems and stole Red Team assessment tools that the ... Read more
Trends & Reports December 8, 2020 Kubernetes Bug Allows Traffic from Other Pods in Multi-Tenant Clusters to be Intercepted A Kubernetes vulnerability has been identified that could allow an attacker to intercept traffic from other pods in multi-tenant Kubernetes clusters. The vulnerability, discovered by ... Read more
Security Breaches December 7, 2020 Ransomware Gangs Cold Call Victims Attempting to Restore Files from Backups Several ransomware threat actors have taken to cold calling victims who are attempting to restore their files from backups to pressure them into paying the ... Read more
Compliance December 3, 2020 Foreign APT Groups Targeting Think Tanks, Warns CISA/FBI The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning about ongoing cyberattacks on think tanks by ... Read more
Tools & Practices December 2, 2020 BEC Scammers Using Auto-Forwarding Rules in Web-Based Email Clients to Prevent Detection Cybercriminals have been using auto-forwarding rules in web-based email clients to increase the chances of success of their business email compromise (BEC) scams, according to ... Read more
Security Breaches December 1, 2020 Cyberbiological Attack Could Fool Scientists into Creating and Using Dangerous DNA A new, theoretical cyberattack has been described by a team of researchers at Ben-Gurion University (BGU) in Israel that could be used in a devastating ... Read more
Security Breaches November 30, 2020 Cyberattacks Increased During the Pandemic as Enterprises Struggled with Security with a Remote Workforce A recent study conducted by the California based endpoint security and systems management company Tanium suggests enterprises have struggled with security during the pandemic and ... Read more
Security Breaches November 27, 2020 Egregor Ransomware Vying to Become the Top Ransomware Threat The Maze ransomware gang may have shut down its operation, but there is now a new ransomware variant that is vying to take its place ... Read more
Trends & Reports November 26, 2020 BEC Gang Members who Scammed More Than 50,000 Organizations Arrested Image source: INTERPOL Three members of a cybercriminal gang that has attacked more 50,000 organizations have been arrested in Lagos, Nigeria. The arrests come at ... Read more
Cyber Threats November 25, 2020 Patch MobileIron Vulnerability Immediately, Warns NCSC The UK National Cyber Security Centre (NCSC) has issued an alert that confirms Advanced Persistent Threat (APT) groups and cybercriminals are currently exploiting the MobileIron ... Read more
Compliance November 24, 2020 Warning Issued After Discovery of Scores of Spoofed FBI Websites Scores of domains have been identified which spoof official Federal Bureau of Investigation (FBI) websites, prompting the FBI’s Internet Crime Complaint Center to issue a ... Read more
Insights November 23, 2020 OpenDNS Alternative Options From the time that Cisco purchased OpenDNS five years ago, companies have sought OpenDNS alternatives as a result of problems that this software tends to ... Read more
Security Breaches November 23, 2020 FBI Issues Warning Following Increase in Ragnar Locker Ransomware Activity A recent increase in Ragnar Locker ransomware activity has prompted the Federal Bureau of Investigation (FBI) to issue a warning to private industry partners. The ... Read more
Tools & Practices November 20, 2020 Facebook Fixes Messenger Bug That Allows Audio to be Transmitted Without a User’s Permission A critical flaw in the Facebook Messenger messaging app for Android which allowed callers to listen to users’ surroundings without permission has been fixed by ... Read more