Understanding ransomware reinfection: An MDR case study
Ransomware is like that stubborn cold that you thought you kicked, but creeps back up determined to run amok again. Ransomware is like that stubborn…
Ransomware is like that stubborn cold that you thought you kicked, but creeps back up determined to run amok again. Ransomware is like that stubborn…
Poorly configured Linux and Internet of Things (IoT) devices are at risk of compromise from a cryptojacking campaign. Poorly configured Linux and Internet of Things…
Malvertising, the practice of using online ads to spread malware, can have dire consequences—and the problem only seems to be growing. This article is based…
Help the people around you that are less computer literate with some basic security tips and settings. Before we get into the tips: a caveat.…
A quick look the cybercriminal group known as Royal—one of the fastest growing ransomware gangs today. When we first introduced the Royal ransomware gang in…
Researchers have found a flaw in Microsoft Azure AD which they claim can be used to take over accounts that rely on pre-established trust. Researchers…
Your big day is over, but while you’re relaxing on honeymoon you don’t want to get distracted by security problems. So, we rounded up some…
There is a lot to be said for the strategy of shielding management interfaces from public internet access On June 13, 2023 the Cybersecurity and…
Apple has released security updates for several products to address a set of flaws it said were being actively exploited. Apple has released security updates…
UPS is warning Canadian customers of potential phishing attempts after data was left accessible via look-up tool. UPS Canada is warning customers in Canada of…
Dive into where we prevented more than the rest and how we were able to do it. MRG Effitas, a world leader in independent IT…
The FTC is going head to head with a DNA testing startup which left consumer data unsecured on Amazon buckets. DNA testing has long been…