A cyber-enabled influence effort codenamed Ghostwriter was discovered in July 2020. Poland, Lithuania, and Latvia were the main targets. The campaign, however, has been linked to an unclassified threat actor, according to some developments cited... Read more
In recent years the growing threats to Apple computers have gone mainstream and cybercriminals are doing everything they can to exploit the publicly disclosed vulnerabilities. The Shlayer malware was recently abused by a perilously bad vulnerabi... Read more
A large-scale business email compromise (BEC) campaign was detected by tech giants Microsoft that used using typo-squatted domains registered a few days before the attacks started for targeting more than 120 organizations. Various tactics are us... Read more
Before allowing junior administrators to take on solo projects of their own a few organizations hand them huge responsibilities for them to gain some on-the-job experience. Specific administrative access is delegated to user accounts so they can... Read more
Last week through our blog post we established that organizations need to conduct cybersecurity vulnerability assessments on a regular basis to secure their sensitive data ensuring their networks and systems cannot be exploited. However, a failu... Read more