Recent Cyber Incidents reported in the past week!

It has been a tumultuous week marked by a series of concerning cyberattacks. Firstly, the financial advisory firm Kroll, a financial advisory firm, has recently experienced a data breach. The firm is handling bankruptcy proceedings for DeFi companies FTX, BlockFi, and Genesis Global Holdco. Kroll said that on August 19, bad actors targeted a T-Mobile…

Read More

Apple Mail Security Vulnerability Allows Email Snooping

The researcher is offering details on CVE-2020-9922, which can be triggered just by sending a target an email with two .ZIP files attached. A zero-click security vulnerability in Apple’s macOS Mail would allow a cyberattacker to add or modify any arbitrary file inside Mail’s sandbox environment, leading to a range of attack types. According to…

Read More

Spotify Gets Hit Again

Protection against credential stuffing isn’t something that a company like Spotify should struggle with, and suffering two credential stuffing incidents in one quarter shows a sloppy attitude toward security. As many as 100,000 of the music streaming service’s customers could face account takeover. Spotify has returned for another appearance with a credential stuffing disaster eerily…

Read More

New Malware Maker Got Past Apple Security

Apple has been historically very good at keeping malware out of their app store, and they’re constantly improving their security protocols on that front. In fact, since February of this year (2020), all Mac software distributed outside of its Mac App Store must be notarized by Apple. The developers must demonstrate that their products are…

Read More

7 VPNs that you thought were safe

7 VPNs that leaked their logs – the logs that “didn’t exist” VPNs are all the rage these days, because they’re supposed to boost your privacy and stop you being tracked. In fact, “VPN” has become a word in its own right, pronounced vee-pee-en, and it’s a crowded market with companies advertising online, on TV…

Read More

Hackers Attacking Exchange Servers In New Warning From Microsoft

Recently, Microsoft’s Defender ATP Research Team issued guidance relating to defending against attacks that target Exchange servers. They are coming under increasing attack based on the latest Microsoft statistics, which show a marked increase in the use of web shells on on-premises Exchange servers. The company is currently tracking multiple ongoing attacks, some of which…

Read More

Backup is King

Everyone should backup their data, especially for a business. Unforeseen events happen and no matter how much you pray, wish or deny, failures happen. I believe in the 3-2-1-0 Rule, regardless of Operating System, Manufacture or Support Contract. This approach helps to answer two important questions: how many backup files should I have and where…

Read More

Our privacy is once again being trampled on.

The US Senate recently passed a bill to extend elements of the Patriot Act. Notably, this legislation included parts that would increase the FBI and CIA’s ability to legally access your browser search history without a warrant. The age-old argument that’s often trotted out when government power is expanded to trespass on individual privacy is…

Read More

Weekly Security Update – May 1st

Ransomware has been a dominant threat to organizations for several years now, causing damage estimated to be in the billions of dollars. Increasingly, a common action carried out by ransomware attacks is to erase the volume backups (i.e., shadow copies), thereby preventing victims from being able to recover any files that had been encrypted. Defenders…

Read More

How safe is ZOOM?

A new Zoom flaw lets hackers record Zoom meeting sessions and to capture the chat text without the knowledge of meeting participants’ even though host disables recording option for the participants. https://gbhackers-com.cdn.ampproject.org/c/s/gbhackers.com/zoom-malware/amp/

Read More