2024 was a banner year for cyber attacks across the globe. A few data points as it relates to cyber attacks which occurred in 2024 inlcude: According to the “The State of Ransomware 2024” report by Sophos, ransomware impacted 59% of respondents. Phishing attacks skyrocketed by 4,151% since the public release of ChatGPT in late…
Third Party Cyber Security Risks A third-party vendor is any outside or external entity that an organization does business with. This includes suppliers, manufacturers, service providers, business partners, affiliates, brokers, distributors, resellers and agents. From an IT perspective, they often fall under the service provider or affiliate areas. Organizations often have to share data or…
How to recognize a phishing email Phishing is by far the most common information gathering method used by cyber attackers. If you respond to a phishing email, it tells the attacker that the email address is valid and there’s actually a potentially vulnerable human being at that address. There are a few things we all…
Top 5 Cyber Security Threats of 2020 The year 2020 will go down in history as the year the world was struck by the COVID-19 pandemic resulting in large numbers of hospitalizations and deaths. The pandemic also had a major impact on computer networks and computer systems as many businesses implemented telework solutions. The overall…
As described by Mr. Lenny Zeltser, malware analysis can occur in 4 distinct phases. These steps and methods are listed in order from easiest to hardest. They are: Fully Automated Analysis Static Properties Analysis Interactive Behavior Analysis Manual Code Reversing Fully automated analysis involve the use of tools that scan files and produce reports on…
Data Breaches What is a data breach? Generally, a data breach is a security incident where digital information is accessed or taken in an unauthorized manner. Enterprise risk management explains that there are five types of data breaches: Malware Phishing Password Attacks Ransomware and Denial-of-Service Malware is software whose purpose is to harm a device…
Loyphish – Malicious Software PWS:HTML/Loyphish.G, more commonly referred to as Loyphish, is a type of attack that involves visiting a phishing page, which is a malicious webpage used to steal your login credentials. It belongs to be a member of the PWS:HTML/Phish family. In most cases it disguises itself as a legitimate banking webpage and attempts…
Ransomware is a type of malware that prevents or limits users from accessing their computer systems, either by locking the system’s screen or by locking the users’ files via encryption unless or until a ransom is paid. Security experts have warned that ransomware is the fastest growing form of computer virus. Like other computer viruses, it usually finds…
We use cookies to enhance your experience and analyze site traffic. By clicking "Accept", you consent to our use of cookies. Learn more in our Privacy Policy.
Cookie Preferences
Necessary
Required for the website to function properly and cannot be disabled.
Functional
Enable enhanced features and remember your preferences for a better experience.
Analytics & Performance
Help us understand how visitors use the site to improve performance and usability.
Marketing
Used to deliver relevant advertisements and marketing based on your interests.