<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=694598870919452&amp;ev=PageView&amp;noscript=1">
Jan 22

Threat Intelligence: Adware Installers Using Rumba Variant STOP

Photo credit: Pixabay

read more →
Jan 11

Threat Intelligence: Government Websites Down Due to Non-Renewed TLS Certificates

Photo by Jomar on Unsplash

read more →
Dec 19

Threat Intelligence: NASA Hit With Data Breach

Current and former employees of NASA from July 2006 through October 2018 could have been affected by a data breach, but the exact number is not known at this time. A server containing 
PII (Personally Identifiable Information) of employee’s was discovered to have been hacked on October 23rd. Cybersecurity personnel belonging to NASA immediately began securing the server that had been breached to prevent any further information from being compromised. Federal cybersecurity acquaintances have also been called in to help determine how the breach happened, and what information was accessed.

read more →
Dec 14

Threat Intelligence: New LamePyre Mac Malware

The third malware strain targeting MacOS this month has been discovered and dubbed LamePyre. Although it appears to still be under development, the malware is able to perform a few functions. LamePyre traps its victims by showing up as a duplicate of the Discord app utilized by gamers. In actuality, it is only a shell which appears as the run of the mill Automator symbol in the menu bar on MacOS when kept running by the user.

read more →
Jun 26

Social Engineering Attacks and Mitigations Part III: Dumpster Diving

Considering various types of Social Engineering attacks, realize that all of them can be dangerous and have detrimental effects on the entire organization. Many people believe they know the different kinds of Social Engineering and how to avoid them, but they really only know a few different methods, mostly on the cyber side. While many of these attacks are cyber, there are also plenty that are physical. This week, we will look into the dirty job of dumpster diving and how to prevent it.

read more →
Jun 22

Social Engineering Attacks and Mitigations Part II: Shoulder Surfing

Shoulder surfing is something that most people do every day in one way or another. Most of the time, this simple practice is done without the intention of stealing information. This practice can be used for malicious purposes however, so it is important to prevent unwanted parties from viewing confidential information or trade secrets displayed on your screen.

read more →
Mar 05

EvilOSX

On February 14th, 2018, a new variant of an OS X RAT called “EvilOSX” has appeared on Github.

read more →
Feb 21

Social Media: The Overlooked Critical Infrastructure of Chinese Manufacturing

It is no doubt that social media has a hold on people around the world, but it has an especially mesmerizing effect on the factory workers of China’s migrant manufacturing towns. 

read more →
Feb 06

Critical Vulnerability Found in Grammarly Spell Checker

Researchers have discovered a critical vulnerability in the Google Chrome and Firefox browser extension for the grammar checking software Grammarly. 

read more →
Feb 06

Fake Online FBI Scam

A new cyberattack is impersonating the FBI’s Internet Crime Complaint Center and trying to scam personal data from victims or download malicious files.

read more →