top of page

Blog
Search


In The News: Cyber Criminals Now Getting Help from Quantum Builder Sold on Dark Web
Recently, a specific type of malware builder known as the Quantum Builder is being harnessed to provide access to "Agent Tesla" remote...
Michael Paulyn
Nov 6, 20221 min read


Notorious Russian National, Known for Money Laundering using Crypto, is Extradited to the U.S.
The Russian national in question, Alexander Vinnik, is accused of using BTC to launder money. Vinnik has been extradited to the United...
Michael Paulyn
Nov 3, 20221 min read


Here are Some of the Most Common Online Threats Affecting Seniors: Part 3
Based on data released by the FBI and National Council on Aging (NCOA) in the USA, these are some of the most common fraud scams that...
Michael Paulyn
Oct 30, 20222 min read


Here are Some of the Most Common Online Threats Affecting Seniors: Part 2
The internet can be terrifying for those new and still learning the ins and outs of technology. This fact can be especially actual for...
Michael Paulyn
Oct 27, 20222 min read


A Match Made in Heaven, Cryptocurrency and Ransomware
The partnership between crypto and ransomware isn't something new. The two now seem to go hand-in-hand regarding cybercriminals trying to...
Michael Paulyn
Oct 23, 20221 min read


Here are Some of the Most Common Online Threats Affecting Seniors
The internet can be terrifying for those new and still learning the ins and outs of technology. This fact can be especially actual for...
Michael Paulyn
Oct 20, 20222 min read


What is Ransomware?
Ransomware is a particular type of malware that cybercriminals use to prevent a user or company from accessing their files or even...
Michael Paulyn
Oct 16, 20221 min read


The US Discovers a Digital Hacking Tool Able to Breach Most Industrial Control Systems
The United States federal government has discovered malware that breaches industrial control systems. This new malware uses a piece of...
Michael Paulyn
Oct 13, 20221 min read


Many Security Experts Say Beware of 2 Main Client-Side Risks Linked to Data Exfiltration and Loss
Some cybersecurity experts are sharing warnings to beware of two main client-side risks linked to data exfiltration and loss. The first...
Michael Paulyn
Oct 9, 20221 min read


In The News: Using Dropbox and Google Drive, Russian Hackers Spread Malicious Payloads
Most recently, hackers sponsored by the Russian government working under APT29 have been conducting a phishing campaign. With the help of...
Michael Paulyn
Oct 6, 20221 min read


Sneaky Hackers Break into LastPass Developer System and Make Off with Source Code
The famous password management service LastPass confirmed that hackers made off with the system's source code and other technical...
Michael Paulyn
Oct 2, 20221 min read


Breached Over 30,000 Times, This Cloud Botnet Used to Mine Crypto
Currently, 8220, the crypto mining group, has just expanded and infected over 30,000 infected hosts, increasing by 2,000 since 2021. This...
Michael Paulyn
Sep 29, 20221 min read


In The News: Apple Announces New Security Updates for Devices, Remedying Dozens of Weak Points
Recently, Apple announced new security updates remedying issues with iOS, iPadOS, macOS, tvOS, and watchOS, operating systems have dozens...
Michael Paulyn
Sep 25, 20221 min read


FBI Recovers Over $500,000 In Ransomware Payments and Crypto from N. Korean Hackers
The United States Department of Justice announced they’ve recovered over $500k worth of Bitcoin from North Korean-sponsored hackers using...
Michael Paulyn
Sep 22, 20221 min read


In The News: Uber Says No Sensitive Data Leaked in Latest Breach
Recently, Uber shared an update stating that they found no evidence that any private user data was leaked from its computer system. Uber...
Michael Paulyn
Sep 18, 20221 min read


SaaS Security: It Turns Out Our Devices Are a New Weak Point
Recently, it's come to light that hackers have found a new way to infiltrate a company's network through mobile devices. By employees...
Michael Paulyn
Sep 15, 20221 min read


With the help of Evilnum Malware, Hackers can Easily Target Crypto Platforms
The Advanced Persistent Threat (APT) system was able to track down Evilnum, which has shown vital signs of activity focused on European...
Michael Paulyn
Sep 11, 20221 min read


Russians Hack Broadcasting Hilarious Fake News About Zelenskyy's Health
Recently, a local Ukrainian radio, TVAR Media, was the victim of a Russian cyberattack, where a hilarious fake message about President...
Michael Paulyn
Sep 9, 20221 min read


The CISA Increase Catalog of New Vulnerabilities with 10 New Items
The United States Cybersecurity and Infrastructure Security Agency (CISA) has announced that it has added ten new active vulnerabilities...
Michael Paulyn
Sep 4, 20221 min read


Using a New Linux Malware Framework, Attackers can Secretly Install Rootkits
A never-before-seen Linux malware virus that can set up rootkits and has a modular approach has received the nickname "Swiss Army Knife."...
Michael Paulyn
Sep 1, 20222 min read
bottom of page