In recent years the growing threats to Apple computers have gone mainstream and cybercriminals are doing everything they can to exploit the publicly disclosed vulnerabilities. The Shlayer malware was recently abused by a perilously bad vulnerabi... Read more
A large-scale business email compromise (BEC) campaign was detected by tech giants Microsoft that used using typo-squatted domains registered a few days before the attacks started for targeting more than 120 organizations. Various tactics are us... Read more
Before allowing junior administrators to take on solo projects of their own a few organizations hand them huge responsibilities for them to gain some on-the-job experience. Specific administrative access is delegated to user accounts so they can... Read more
Last week through our blog post we established that organizations need to conduct cybersecurity vulnerability assessments on a regular basis to secure their sensitive data ensuring their networks and systems cannot be exploited. However, a failu... Read more
Dridex is back to tormenting users again. It has marked its return with a phishing attack pretending to be invoiced from QuickBooks. The ongoing campaign that started on the 19th of April 2021 is targeting users of the accounting software and in... Read more