Corporate branding can be worth its weight in gold and certain images are absolutely iconic. The Golden Arches, the Nike “swoosh,” and Apple’s Apple all come to mind. Logo images give companies the means of offering a consistent brand image over time, and that can be a very good thing. …
Ransomware Hackers Have Set Their Sights On Exchange Servers
Microsoft Exchange servers are once more in the crosshairs of hackers around the world. Most recently, hacking groups have been specifically targeting them to deploy BlackCat ransomware. As is common among ransomware attacks, the hackers here first rifle through an infected network, looking for login credentials, proprietary information, and other …
New Panchan Botnet Targets Linux Servers
If you’re involved with IT Security at any level and if your network includes Linux servers, keep a watchful eye out for the new Panchan botnet. It first appeared in the wilds on March of this year (2022) and its main focus seems to be targeting Linux servers in the …
How To Protect Your Company With Cybersecurity Awareness
These days, companies spend significant sums of money to protect themselves from cyber criminals. The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies not only spend heavily on antivirus software, but also on a wide range of tools that IT security …
Simple Ways To Hire The Perfect Candidate The First Time
Top quality talent can be difficult to find in any field, if you have spent any time looking for and hiring people, you know the challenge can be an especially daunting one. There’s tremendous competition for talented folks. Given the cost of hiring and training new people, it’s something you …
Researchers Warn About Symbiote Malware Which Attacks Linux Machines
Are you a Linux user? If so, be aware that there is a new kind of malware to be concerned about. The BlackBerry Threat Research and Intelligence team, in concert with Joakim Kennedy (an Intezer Analyze security researcher), have announced the discovery of a new strain of malware. They’ve dubbed …
Emotet Malware Will Include Credit Card Theft In Attacks
If you’re involved in information security in any capacity, you’re probably quite familiar with the infamous Emotet botnet. It’s one of the most dangerous and prolific botnets out there and it is a dire threat to organizations of all sizes. The bad news is that the botnet is still being …
Beware New Windows Vulnerability With Remote Search Window Access
You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief. Hickey is the co-founder of a company called Hacker House. He recently discovered a flaw that could allow for the opening of a remote search …
Some Carrier Embedded Android Apps May Have Security Vulnerabilities
Recently, Microsoft reported high severity security vulnerabilities in multiple apps offered by large international mobile service providers. What makes this especially noteworthy is the fact that these vulnerabilities aren’t app specific, but framework specific. Many carriers use the same basic framework to construct their apps and now all have been …
Intel Users Should Update Firmware To Avoid This Ransomware
Not long ago, researchers at Eclypsium got a lucky break. An unknown and unidentified individual began leaking communications from inside the Conti ransomware organization. These leaked communications seemed to confirm what has long been suspected: That there are strong ties between the Conti gang and Russia’s FSB (military intelligence). This …