top of page

Blog
Search


Sneaky Hackers Break into LastPass Developer System and Make Off with Source Code
The famous password management service LastPass confirmed that hackers made off with the system's source code and other technical...
Michael Paulyn
Nov 19, 20231 min read


Breached Over 30,000 Times, This Cloud Botnet Used to Mine Crypto
Currently, 8220, the crypto mining group, has just expanded and infected over 30,000 infected hosts, increasing by 2,000 since 2021. This...
Michael Paulyn
Nov 17, 20231 min read


In The News: Apple Announces New Security Updates for Devices, Remedying Dozens of Weak Points
Recently, Apple announced new security updates remedying issues with iOS, iPadOS, macOS, tvOS, and watchOS; operating systems have dozens...
Michael Paulyn
Nov 12, 20231 min read


FBI Recovers Over $500,000 In Ransomware Payments and Crypto from N. Korean Hackers
The United States Department of Justice announced they've recovered over $500k worth of Bitcoin from North Korean-sponsored hackers using...
Michael Paulyn
Nov 10, 20231 min read


In The News: Uber Says No Sensitive Data Leaked in Latest Breach
Recently, Uber shared an update stating that they found no evidence that private user data was leaked from its computer system. Uber...
Michael Paulyn
Nov 5, 20231 min read


SaaS Security: It Turns Out Our Devices Are a New Weak Point
Recently, it's come to light that hackers have found a new way to infiltrate a company's network through mobile devices. By employees...
Michael Paulyn
Nov 3, 20231 min read


With the help of Evilnum Malware, Hackers can Easily Target Crypto Platforms.
The Advanced Persistent Threat (APT) system was able to track down Evilnum, which has shown vital signs of activity focused on European...
Michael Paulyn
Oct 29, 20231 min read


The CISA Increase Catalog of New Vulnerabilities with 10 New Items
The United States Cybersecurity and Infrastructure Security Agency (CISA) has announced that it has added ten new active vulnerabilities...
Michael Paulyn
Oct 27, 20231 min read


Using a New Linux Malware Framework, Attackers Can Secretly Install Rootkits
A never-before-seen Linux malware virus that can set up rootkits and has a modular approach has received the nickname "Swiss Army Knife."...
Michael Paulyn
Oct 22, 20232 min read


Quick Snapshot: What is Python?
Python has taken the tech world as one of the most popular coding languages. With a range of versatility that extends from machine...
Michael Paulyn
Oct 20, 20231 min read


In The News: Meta Was Restricting Abortion Content
As luck would have it, Meta is now again in hot water, not for another metaverse idea but for actively restricting content on abortion....
Michael Paulyn
Oct 13, 20231 min read


In The News: As It Turns Out, China's Been Hacking US Phone Networks
China has been secretly hacking the United States' phone networks for years without anyone being the wiser. Over the last two years,...
Michael Paulyn
Oct 7, 20231 min read


Hot Off the Press: Update Your Windows OS and Chrome Browser
This past June saw a ton of software updates across many platforms, many of which fixed some major weak points and vulnerabilities. It...
Michael Paulyn
Oct 4, 20231 min read


Quick Snapshot on Ransomware's Elements
Ransomware is a type of malware that cybercriminals use to prevent users from having access to their network, system, or data. Hackers...
Michael Paulyn
Sep 30, 20231 min read


In The News: Experts Ringing the Alarm Against New Threat of "Black Basta" Ransomware
Listen up if you're in the United States, Canada, Australia, New Zealand, or the United Kingdom. Cybersecurity experts are ringing the...
Michael Paulyn
Sep 27, 20231 min read


ZuoRAT: The New Spyware That's Infiltrating Home-Office Routers
As working from home has become the norm for many people worldwide, hacks have taken notice. A new cutting-edge "remote access trojan...
Michael Paulyn
Sep 23, 20231 min read


What Is Shadow IT, And Why Is It So Risky?
Shadow IT is the process by which users work to use unauthorized technology resources to skirt around their IT department firewalls and...
Michael Paulyn
Sep 20, 20231 min read


The US Could Be Breaking Up with TikTok Thanks to the FCC Commissioner
Recently, it's come out that the US Federal Communications Commission (FCC) has revived the idea of requesting that the Apple and Google...
Michael Paulyn
Sep 16, 20231 min read


Google's Latest AI Chatbot Project Might Be Alive, Says Engineer
An engineer working for Google recently stated that the company's latest AI chatbot project might be alive. Blake Lemoine interviewed...
Michael Paulyn
Sep 13, 20231 min read


Everything Any Businessperson Needs to Know About Vulnerability Assessment Reports: Part 2
When some businesspeople hear the term "vulnerability assessment report," their immediate thought is, "Oh gosh, not something else," and...
Michael Paulyn
Sep 9, 20231 min read
bottom of page