Category Archives: Cybersecurity
Vulnerability With Arris Routers
Remote code execution vulnerability in Arris routers. ISPs typically provide these routers in loan for customers’ telephony and internet access.
Level-up Cyber Security Awareness
Level-up Cyber Security Awareness in a few and achievable steps. Cyber Security Awareness is key to protecting your business.
Is Your Microsoft Exchange Server Vulnerable to ProxyNotShell Flaw?
There are approximately 60,000 IP addresses with internet-facing Microsoft Exchange Server instances still vulnerable
Is Your Website ADA Compliant?
Businesses with a website must make modifications to accommodate customers with disabilities under ADA Compliance.
Black Friday Phishing Scams
Black Friday is approaching, and you should be aware of scams. Thirty percent of people in the US reported receiving phishing messages around Black Friday. “[N]early a third of U.S. consumers (30%) said they received a phishing email around Black Friday last year, either by email or SMS to their personal email or cell,” the…
Cyber Threats For Retail Stores
Cyber attacks on retailers are real and can occur online or offline. These attackers are able to enter a retail store in person and hack into your systems.
Android Malware Infects 20 Million Users
A newly discovered Android malware was confirmed to have infected around 20 million users. The Clicker Malware, used 16 malicious apps.
Conduct A ISO 27001 Risk Assessment in 7 Steps
Risk assessments are the most important part of any ISO 27001 project. They help you determine how to get your ISMS in order and keep it that way.
OAuth application abuse used to gain Exchange Online access
Microsoft researchers recently found a new type of attack. Hackers compromise Exchange Online access with malicious OAuth applications and then use it to change your email settings and spread spam. OAuth applications are growing in popularity. One of the first malicious uses of OAuth applications is consent phishing. Consent phishing is a particularly sly form…
Hackers Pivoting Around Macro Blocking in Microsoft Office
Hackers Pivoting Around Macro Blocking in Microsoft Office by using file formats such as ISO, RAR, ZIP, and IMG to send malicious documents.