Blog

Recent Posts

Phishing-as-a-Service on the Rise with Caffeine

Phishing-as-a-Service on the Rise with Caffeine

Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms...
Vice Society Claims Cincinnati State College Cyberattack

Vice Society Claims Cincinnati State College Cyberattack

Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many...
Hackers Execute Arbitrary Code with Microsoft Office

Hackers Execute Arbitrary Code with Microsoft Office

According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to...
Malicious SEO Campaign Affects Thousands of Sites

Malicious SEO Campaign Affects Thousands of Sites

In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As...
Phishing Kit Targets US Shoppers

Phishing Kit Targets US Shoppers

Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures...
Lenovo Patches Critical Security Flaws

Lenovo Patches Critical Security Flaws

Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops....
DuckDuckGo Releases App Tracking Protection Beta for Android

DuckDuckGo Releases App Tracking Protection Beta for Android

The feature is comparable to Apple’s ‘App Tracking Transparency. However, unlike Apple, DuckDuckGo’s method does not rely on app developers’...
How To Develop Accountability In Remote Workers

How To Develop Accountability In Remote Workers

Accountability can be a tricky thing when it comes to your remote employees.  It’s something that even seasoned managers struggle...
Bypass Android Lock Screen on Pixel and Other Devices

Bypass Android Lock Screen on Pixel and Other Devices

David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel...
Recent Growth of Fake LinkedIn Accounts

Recent Growth of Fake LinkedIn Accounts

According to a KrebsOnSecurity article, the recent growth of phony LinkedIn accounts is causing an identity crisis for the business...
To top