Category Archives: Cybersecurity
Why Cybersecurity Matters For Your Small Business
Cybersecurity is a crucial element for continued success in any industry. What I am sharing with you today are reasons why cybersecurity matters for your small business. To succeed in today’s technical ecosystem cybersecurity must be part of your small to medium-sized business operations. So the same way that you’d never leave your store or…
A macOS 0-day vulnerability let hackers take screenshots
A macOS 0-day vulnerability lets hackers take screenshots of your screen. Hackers have been exploiting a vulnerability in fully updated versions of macOS that allowed them to take screenshots on infected Macs without having to get permissions from any users. However, this attack is finally getting patched with the latest macOS 11.4 update released on May…
VMware vCenter VMSA-2021-0010 Advisory
In this VMware vCenter VMSA-2021-0010 Advisory, VMware vCenter Server updates address remote code execution and authentication vulnerabilities (CVE-2021-21985, CVE-2021-21986). VMware Impacted Products? VMware vCenter Server (vCenter Server) VMware Cloud Foundation (Cloud Foundation) Who is affected? VMware Security Advisories always list the specific product versions that are affected. In this case it is vCenter Server 6.5,…
STRRAT Malware Is At It Again
A recent post from the Microsoft Security Intelligence revealed that STRRAT Malware is at it again with a new version release. The STRRAT malware is an odd duck to say the least. This STRRAT Malware is a Java-based RAT that poses as ransomware. It changes the file names on the infected devices by appending the…
What Your Out Of Office Message Tells Hackers
It’s time for a vacation or your going on a business trip and your super excited, naturally our out of office message may reveal some of this excitement to hackers. People don’t naturally think about how cybercriminals would benefit from the details of your Out Of Office Message (OOO). But this attack vector is a…
Is A Comcast Business Modem HIPAA Compliant?
I know the reason your here is to find out if a stand alone Comcast Business Modem can be used in a Medical Practice and pass the HIPAA compliance security check for protecting a healthcare network. Well, first there are a few things we need to know about HIPAA and Firewall Requirements. HIPAA Firewalls 101…
Lost your iPhone? Someone can use Checkm8 and Checkra1n to jailbreak it.
If you lost your iPhone you should be worried. Someone can hack into it with free software called Checkm8 and Checkra1n to jailbreak it. Essentially they would be able to hack into your phone and by pass any security you have in place. Why should we care about Checkm8? The Checkm8 vulnerability works on 11 generations…
Jetty Vulnerability using Invalid Large TLS Frame causes 100% CPU Usage
This Jetty vulnerability is to be considered as a service availability issue. When using SSL/TLS with Jetty, either with HTTP/1.1, HTTP/2, or WebSocket, the server may receive an invalid large (greater than 17408) TLS frame that is incorrectly handled, causing CPU resources to eventually reach 100% usage. The following packages have been upgraded to a…
Let’s plant some trees with Ecosia
Ecosia is all about planting trees. 15 million users have planted over 120 million trees, for free. Just by searching the web. Ecosia donates all of its charitable contributions to tree planting charities that work to plant trees in South America, Africa and Indonesia, where the cost of planting trees is lower. Ecosia knows each…
HIPAA Requirements For Passwords
Did you know, within the HIPAA security requirements there are guidelines for deploying and creating a passwords management policy, this would include: creating, changing and protecting passwords? These guidelines were established under the HIPAA Security Rule and within the HIPAA Security Rule it is required to provide Security Awareness and Training for creating policies and…