Insider Threat image

Malicious Insiders Damage Their Employer Fast

Malicious insider risk is an unpleasant but ongoing situation that every business has to deal with daily. Both current and former employees can intentionally damage a company, and just one disgruntled employee can wreak havoc fast However it happens, malicious insider actions are responsible for an estimated 25% of confirmed …

Attacks on Business VPNs are Increasing

Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that VPNs are becoming a severe threat to their operations. According to a report by Zscaler, nearly half of …

Dropbox Suffers Major Breach in Phishing Attack

It’s no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was compromised. This allowed attackers access to 130 code repositories, which contained sensitive data. Dropbox was notified of a …

SIM Swap Attack Targets Verizon Customers

Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon’s prepaid wireless accounts, compromising approximately 250 individuals. According to a letter to customers, Verizon discovered the breach after noticing “unusual activity” on its network. Due …

Benefits of Having a Dual Monitor Setup for Your Business

In recent years, the use of advanced technology in the office has increased in popularity among businesses to improve their efficiency, productivity, and effectiveness. Whether running a small or large company, it is important to know that utilizing a dual monitor setup in your office can provide quite a few …

Zoom Fixes Severe Security Vulnerability for Mac Users

There is no doubt that Zoom has become very popular in the business and academic sectors, as it is widely used for video conferencing and voice-over IP (VoIP). Zoom issued a security bulletin at the beginning of October, informing users that an update was now available for download in response …

The Evolution of Callback Phishing Scams

Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email campaigns that pose as expensive memberships to confuse recipients who have never signed up for these services. The email includes a phone …

DuckDuckGo for Mac Comes with New Privacy Features

DuckDuckGo announced on October 18, 2022, that the beta version of its Mac desktop app is now available for all Mac users.  DuckDuckGo is a browser that focuses on privacy. It has many new features designed to make web browsing more private and less cluttered, improving the user experience. DuckDuckGo …

Ducktail Malware Returns With New PHP Variant

An advanced PHP variant of the Ducktail malware poses a risk to Facebook users. On October 13th, 2022, ZScaler, a cloud security firm, published a blog post detailing this latest discovery. The new PHP version is being distributed by “pretending to be a free/cracked program installer.” It also targets numerous …

DDoS IP Protection: A New, Low-Cost Option for SMB

Microsoft announced the Azure DDoS IP Protection released as a public preview on October 19, 2022. Small and medium-sized businesses (SMBs) can now benefit from DDoS protection with a pricing model customized to their specifications. DDoS Protection provides similar capabilities to DDoS Network Protection (previously known as DDoS Protection Standard). …