U.S. government officials are investigating TP-Link routers for potential national security risks, with reports linking them to cyberattacks targeting think tanks and government agencies. Learn how DD-WRT firmware could enhance your router’s security and functionality. Microsoft reveals a critical Windows Remote Desktop Services vulnerability with a CVSS score of 8.1, highlighting the importance of prompt […]
A major data breach exposes the personal information of 2.5 million student loan borrowers, sparking investigations and potential class action lawsuits. A sophisticated phishing campaign compromises thousands of accounts at companies like Twilio and DoorDash, highlighting the vulnerabilities of multi-factor authentication. Meanwhile, Chinese espionage group Red Laden uses fake news sites to deliver malware, and […]
Chinese hackers, linked to the Salt Typhoon group, have infiltrated U.S. law enforcement wiretap systems, compromising critical telecom providers like AT&T and Verizon. A UK-based DNA testing company, Atlas Biomed, has vanished, leaving customers without access to their genetic data and raising concerns over its ties to Russia. Meanwhile, Palo Alto Networks confirms active exploitation […]
In 2020 the genie was let out of the bottle, so to speak, when the pandemic necessitated thewidespread movement of technology workers to remote work. Working from home was already agrowing trend and the forced closing of businesses and office spaces accelerated the practice to thedegree that now there is no going back. Although many […]
The Australian government has passed a new piece of legislation that, at its core, permits government enforcement agencies to force businesses to hand over user info and data even though it’s protected by cryptography. If firms don’t have the power to intercept encrypted data for authorities, they will be forced to create tools to allow […]
Cisco has announced there will be no patch released for a critical security vulnerability discovered in their Small Business line of routers, as the affected devices reached their end of life in 2019. The critical issue, CVE-2021-34730, affects the Universal Plug-and-Play (UPnP) service and could allow unauthenticated attackers execute commands on the router or cause […]
Multi-factor authentication (MFA), or two-step verification, is one of the simplest ways to addprotection to your technology and data. By requiring an additional piece of information, or step, toestablish identity, systems are strengthened against the vulnerabilities that come with poor passwordand username practices. MFA employs a combination of various methods that can be used as […]
The business of cybercrime is becoming more and more sophisticated each day as hackers perfect their methods and discover new ways of taking advantage of unsuspecting users. In spite of the new and creative ways that these criminals devise to infiltrate businesses and organizations, a great number of attacks are still perpetrated with tried-and-true methods […]
The recent attack that shut down the Colonial Pipeline has made “ransomware” a household word, but this cybercrime is nothing new. School districts have become particularly vulnerable to these attacks, which have increased substantially over the past year as schools shifted focus to provide remote learning for students. In a report published by the K-12 […]
A recent attack on the crisis management system of the Cobb County Georgia school district led to a code red lockdown, producing disruption and anxiety in several schools across the district. The cause of the breach was traced to an employee of the crisis management service whose access was exploited due to a weak password. […]
- 1
- 2