Has Your Device Been Compromised?

Cybercriminals are very devious and have many ways to compromise devices to steal information. This Insight offers some indicators that your device may be compromised. 


Signs of device compromise

Chrome 108 Patches High-Severity Memory Safety Bugs

Patches for many newly discovered bugs in Chrome have been issued. Be sure and install the patches as soon as possible because many are very serious compromises. 


Install these patches ASAP

The Evolution of Business Email Compromise

Business Email Compromise is a major attack method. This article explains how this favorite attack type evolved.  


How BEC developed

Web App and API Attacks Surge 257% in Financial Services

Financial services are a favorite target for cybercriminals. The attacks are increasing, so be extra careful.

Financial Services attacks surge

IBM Cloud Supply Chain Vulnerability Showcases New Threat Class

Cybercriminals are creative in their approaches to compromising your accounts and systems. This article shows a new class of threats. 


New Threat Class Discovered

Social Media-Friend and Foe

Social media has grown to be a necessary service for businesses to share all types of information. But it has also become a service that is heavily exploited by cybercriminals. Learn the risks. 

Social Media-risk and reward

Phishing Attacks Misuse Microsoft Dynamics 365 Customer Voice Functionality to Hide Malicious Links

By using legitimate features of popular software, cybercriminals are able to avoid detection by anti-malware programs and spread their infections. 

True app features used to conceal malware

Zero-Trust Initiatives Stall, as Cyberattack Costs Rocket to $1M per Incident

As valuable as zero-trust has proven to be, over stretched cybersecurity teams and the shift to cloud or multiple cloud environments are has slowed the deployment to a crawl. 

Zero-Trust initiatives put on hold

Hundreds Infected With 'Wasp' Stealer in Ongoing Supply Chain Attack

Python, a popular programming language, is being used to spread malware. The Python download package is infected with malware and downloading it infects your systems. 


Python packages infected

China-Based Billbug APT Infiltrates Certificate Authority

Certificates are used to prove a service or app is who they say they are. The Certificate authority verifies that fact before issuing the certificate. But with a compromised certificate authority, trust is significantly diminished. 


Compromised certificate authority creates problems

Cyber Safety Basics

Cyber security is complex and changing. But certain actions remain basic and effective at helping keep your information safe and your company in business.

Patch ASAP: Critical Citrix, VMware Bugs Threaten Remote Workspaces With Takeover

Critical vulnerabilities in Citrix and VMware allow cybercriminals to takeover remote workspaces. Patches are available. Be sure to install them ASAP. 

Keeping up to date with patches is important

FBI Warns of Tech Support Scams That Impersonate Payment Portals for Fake Refunds

Refunds get our attention. Especially at this time of year with holiday expenses. But the refunds are not always real. 

Watch out! The refund offer may not be what you expect

Phishing Campaign Abuses Microsoft Customer Voice

Microsoft Voice is used by MS to collect feedback. But cybercriminals are using it to convince people to go to a link for a voicemail that uses a real Microsoft link. However, the Play Voicemail button goes to a phishing site. 

MS Voice and real site used in phishing scam

Evasive KmsdBot Cryptominer/DDoS Bot Targets Gaming, Enterprises

Recently we warned of an attack on gamers that was considered a trial balloon by cybercriminals before they went after enterprises. The trial must have been successful because now they are going after gamers and enterprises. 


Initial attacks on gamers move to enterprises