Category Archives: Security Awareness
Polkit vulnerability provides local privilege escalation bypass
Many of the Linux distros are vulnerable to the Polkit exploit. This vulnerability provides a local privilege escalation bypass. A hacker can easily obtain root access with this vulnerability. The vulnerability was recently discovered by GitHub Security Lab security researcher Kevin Backhouse. The vulnerability CVE-2021-3560 was publicly disclosed, and a fix was released on June 3, 2021. Make sure…
Fraud Awareness: What Does Fraud Look Like?
Fraud happens every day and you and your employees may not even know that you have been defrauded out of your information or money. Cyber Fraud is real and you must be vigilant. Identifying when someone is trying to defraud you or your organization is a vital part of the day-to-day responsibilities of your employees….
Staying Safe In The Cloud
I’m sure by now your company has you working with some cloud applications like Microsoft 365, Google Docs, Dropbox and Salesforce just to name a few. You need to be vigilant because hackers can use tactics to trick you into fake landing portals. Did you know that Nearly 80% of organizations have experienced a cloud…
Have You Heard Of Text Message Scams Called Smishing?
Have you ever received unsolicited mobile text messages with an unfamiliar or strange web link? Well this is a trick to target recipients into clicking a link and sending the attacker private information or downloading malicious programs to a smartphone. Fewer people are aware of the dangers of clicking links in text messages and…
Why Cybersecurity Matters For Your Small Business
Cybersecurity is a crucial element for continued success in any industry. What I am sharing with you today are reasons why cybersecurity matters for your small business. To succeed in today’s technical ecosystem cybersecurity must be part of your small to medium-sized business operations. So the same way that you’d never leave your store or…
What Your Out Of Office Message Tells Hackers
It’s time for a vacation or your going on a business trip and your super excited, naturally our out of office message may reveal some of this excitement to hackers. People don’t naturally think about how cybercriminals would benefit from the details of your Out Of Office Message (OOO). But this attack vector is a…
Let’s plant some trees with Ecosia
Ecosia is all about planting trees. 15 million users have planted over 120 million trees, for free. Just by searching the web. Ecosia donates all of its charitable contributions to tree planting charities that work to plant trees in South America, Africa and Indonesia, where the cost of planting trees is lower. Ecosia knows each…
Purple Fox Malware Evolves With Worm Capabilities
The Windows malware called Purple Fox Evolves with worm capabilities. Purple Fox in the past the malware targeted Windows machines through a various attack methods like phishing and exploits before the software was evolved. Guardicore Labs revealed that Purple Fox can now breach windows machines through SMB Brute-Force attacks. The Purple Fox malware would compromise…
Has your computer been hijacked with cryptojacking?
There are so many ways that hackers can use your computer to make themselves money and cryptojacking is one of them. Worst part about it is if you don’t have proper security in place you wont even know that your infected. What is Cryptojacking? Well the term cryptojacking refers to the unauthorized use of someone’s…
Importance of Cyber Security in the Workplace
Organizations need to elevate their security posture at the workplace and put in place a cyber security policy to better protect their data and their client’s data. Most company’s these days have a database containing confidential information such as: Private financial data of company assets. Personal details of customers, executives, employees, vendors and partners of…