Category Archives: Cybersecurity
Vulnerability in Cisco Small Business Switches
Nothing new with these Cisco Small Business Switches. A researcher, Jasper Adriaanse has identified several vulnerabilities, including ones that have been rated high severity, in Cisco’s Small Business 220 series smart switches. These vulnerabilities were discovered to impact switches that run firmware versions earlier than 1.2.0.6 and have the web-based management interface enabled which the…
Ransomware Risk Management
The National institute of Standards and Technology (NIST) has released a new document called: cybersecurity framework profile for ransomware risk management. The document contains detailed steps that you can take to reduce the risk of infection and it has was to prevent ransomware attacks. They outline these basics NIST has provided the basic and best…
Phishing Attacks Growing At Rapid Pace
In a recent research report it was revealed that there has been a growing increase in phishing attacks since the pandemic. According to the research report by the FBI, 11 times more phishing attacks were reported in 2020 as compared to 2016 and 91% of security breaches were initiated by sending phishing attacks on victims….
SSL VPN Attacks Up Nearly 2000%
A recent report published by Nuspire outlined what activity cyber criminals have been up to. SSL VPN attacks have gone up nearly 2000%. Increase in VPN attacks In Q1 2021, there was a 1,916% increase in attacks against Fortinet’s SSL-VPN and a 1,527% increase in Pulse Connect Secure VPN. These vulnerabilities allow a threat…
54% of all employees reuse passwords on multiple accounts
Yubico released the results of a study into current attitudes and adaptability to at-home corporate cybersecurity, employee training, and support in the current global hybrid working era. The report surveyed 3,006 employees, business owners, and C-suite executives at large organizations (250+ employees), who have worked from home and use work issued devices in the UK,…
Polkit vulnerability provides local privilege escalation bypass
Many of the Linux distros are vulnerable to the Polkit exploit. This vulnerability provides a local privilege escalation bypass. A hacker can easily obtain root access with this vulnerability. The vulnerability was recently discovered by GitHub Security Lab security researcher Kevin Backhouse. The vulnerability CVE-2021-3560 was publicly disclosed, and a fix was released on June 3, 2021. Make sure…
6 In The Wild Exploits Resolved With Windows Patch Tuesday
This Tuesday Microsoft Windows Patch Tuesday has deployed a sum of 50 patches which also included critical patches to mitigate 6 vulnerabilities that are being used in the wild to run exploits on systems. Elevation vulnerability’s are no joke because hackers can log into your system as an administrator and push wide spread ransomware. I…
Fraud Awareness: What Does Fraud Look Like?
Fraud happens every day and you and your employees may not even know that you have been defrauded out of your information or money. Cyber Fraud is real and you must be vigilant. Identifying when someone is trying to defraud you or your organization is a vital part of the day-to-day responsibilities of your employees….
Staying Safe In The Cloud
I’m sure by now your company has you working with some cloud applications like Microsoft 365, Google Docs, Dropbox and Salesforce just to name a few. You need to be vigilant because hackers can use tactics to trick you into fake landing portals. Did you know that Nearly 80% of organizations have experienced a cloud…
Have You Heard Of Text Message Scams Called Smishing?
Have you ever received unsolicited mobile text messages with an unfamiliar or strange web link? Well this is a trick to target recipients into clicking a link and sending the attacker private information or downloading malicious programs to a smartphone. Fewer people are aware of the dangers of clicking links in text messages and…