How To Protect Your Company With Cybersecurity Awareness

These days, companies spend significant sums of money to protect themselves from cyber criminals. The threat matrix is vast, and attacks can come from almost any quarter. That is why many companies not only spend heavily on antivirus software, but also on a wide range of tools that IT security professionals can leverage to intercept attacks "at the gates" and prevent attackers from ever breaching their defenses. Further, many companies will engage with third-party specialists to provide round the clock monitoring.

Data Breach Hits One Of America’s Largest Healthcare Providers

Do you receive healthcare of any kind from Kaiser Permanente? If so, be aware that they recently published a data breach notification indicating that an unidentified attacker accessed an email account that contained personal health information on April 5th, 2022. Based on the investigation to this point, it appears that sensitive health information belonging to more than 69,000 individuals was exposed. For context, Kaiser Permanente provides a wide range of health care services to more than 12.

Cisco Email Gateway Appliance Users Should Apply Security Patch

Tech giant Cisco recently sent out a notification to its vast customer base urging them to apply a recently issued patch that addresses a critical security vulnerability. This vulnerability could allow an attacker to bypass the authentication process entirely and gain access to the web management interface of Cisco email gateway appliances with non-default configurations. The flaw in question is being tracked as CVE-2022-20798 and is present in the external authentication routines of ESAs (Cisco's Email Security Appliances) and Cisco Secure Email and Web Manager appliances, both virtual and hardware.

Simple Ways To Hire The Perfect Candidate The First Time

Top quality talent can be difficult to find in any field, if you have spent any time looking for and hiring people, you know the challenge can be an especially daunting one. There's tremendous competition for talented folks. Given the cost of hiring and training new people, it's something you want to get right the first time as often as possible. The question is: how? The good news is that there are multiple things you can do to take the guesswork out of the equation.

Massive Phishing Attack Scammed Millions Of Facebook Messenger Users

According to research conducted by the cybersecurity firm PIXM, there is a massive phishing campaign that peaked in April and May of this year (2022) and it is still ongoing. The campaign has lured millions of unsuspecting users to phishing pages by abusing Facebook and Facebook Messenger and tricking users into entering their account credentials. Worse, the hackers then used those credentials to send additional phishing messages to friends of the affected users, luring them in as well and continuing the chain.

Researchers Warn About Symbiote Malware Which Attacks Linux Machines

Are you a Linux user? If so, be aware that there is a new kind of malware to be concerned about. The BlackBerry Threat Research and Intelligence team, in concert with Joakim Kennedy (an Intezer Analyze security researcher), have announced the discovery of a new strain of malware. They've dubbed it Symbiote, and it was named because of its parasitic nature. Actual discovery of the strain occurred a few months ago but the team has been studying it since.

New Malware Uses Word Documents To Get On Your System

Researchers at HP have discovered a new malware loader that they've dubbed SVCReady. While new malware strains are common, this one is distinct for a couple of different reasons. Like many malicious programs, this spreads primarily via phishing email campaigns. One way that this new strain differs however, is the fact that the malware is loaded onto the target machine via specially crafted Word documents attached to the email.

Microsoft Adding Restore Apps Feature To Make Reinstalling Easier

Are you excited about Windows 11? Many people are and in fact there are legions of beta users who are in the Windows Insiders group so they can get a sneak peek at some of the features on deck as updates are released. One of the coolest new features making its way through the development pipeline is the "Restore Apps" feature the company is working on. Its development came about from the realization that one of the most time-consuming tasks associated with setting up a new PC with a fresh Windows installation is the process of restoring all your previously installed apps.

Hackers Are Teaming Up To Wreak Havoc On Corporate Users

It's never a good thing when well-organized groups of hackers start working together, but that's what appears to be happening. Recently, evidence has emerged that the Black Basta ransomware gang has begun tight-knit cooperation with the infamous QBot malware operation. They share the specific goal of inflicting maximum damage on corporate targets. While many different groups make use of QBot for initial infection, Black Basta's use is somewhat different. The group is leveraging it to spread laterally through a network once they have infected it.

Emotet Malware Will Include Credit Card Theft In Attacks

If you're involved in information security in any capacity, you're probably quite familiar with the infamous Emotet botnet. It's one of the most dangerous and prolific botnets out there and it is a dire threat to organizations of all sizes. The bad news is that the botnet is still being actively enhanced and is gaining new capabilities at regular intervals. Most recently, its developers have added a new credit card stealing module that is designed to harvest saved credit card information stored in Google Chrome profiles.

Contact

Network Revolution

Social Media