(866) 695-2175 | Experiencing an IT Emergency?
Blog
June 10, 2020 by Vertical Axion
Recently, Cisco disclosed the existence of four serious security flaws in their routers that use iOS and iOS XE software. One of the four, CVE-2020-3227 is rated at a severity of 9.8 out of 10. It allows a remote attacker without credentials to execute commands to the operating software without proper authorization, which in turn, […]
Read more »
Tagged
May 15, 2020 by Vertical Axion
Are you one of the million-plus website owners making use of Ninja Forms for WordPress? If so, be aware that the company has recently patched a serious security flaw that allowed hackers to inject malicious code and take over websites. The attack is accomplished via a Cross-Site Request Forgery (CSRF) that leads to a Stored […]
May 12, 2020 by Vertical Axion
According to Microsoft, its machine learning threat detection models have helped its research teams uncover multiple mal-spam campaigns. These campaigns have been tied together by the common theme of incorporating poisoned disk image files used as attachments. Each campaign has been aimed at a different target population, but all use some variant of COVID-19 in […]
May 11, 2020 by Vertical Axion
Are you working from home right now? If so, you’re certainly not alone. Tens of millions of people are doing the same, and there are untold millions around the world doing likewise. Working from home presents a host of new challenges, not the least of which is finding ways of communicating face to face without […]
May 1, 2020 by Vertical Axion
Recently, security companies all over the world have seen a surge in spam, hacking, and scam campaigns that are taking advantage of the fear and confusion surrounding the global pandemic. They’re using promises of COVID-19 information and access to pandemic-related equipment as hooks to lure people into clicking on links or downloading poisoned files. Although […]
April 6, 2020 by Vertical Axion
Are you familiar with Astaroth? If you’re a data security professional, you’ve probably at least heard the name. The group gained some notoriety last year when it came to light that they had developed a means of spreading “fileless malware” using legitimate Windows tools to infect machines around the world. The Windows Defender ATP team […]
March 30, 2020 by Vertical Axion
A Pakistani-based hacking group that goes by a variety of names, including “Transparent Tribe,” “APT36,” “Mythic Leopard” and others has been discovered to be behind a particularly nasty attack recently. Researchers with QiAnXin’s RedDrip Team discovered a phishing campaign bearing the group’s stamp. This new campaign utilizes poisoned files that appear to be health advisories […]
March 16, 2020 by Vertical Axion
For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on their guard against them. Naturally, this prompts scammers to change their tactics, switching things up a bit to catch people by surprise. In […]
March 14, 2020 by Vertical Axion
Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year (2020). When targeted by this attack, a user will get an email containing a braded document containing the name of a legitimate cybersecurity […]
March 11, 2020 by Vertical Axion
Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number of online accounts as a two-factor authentication layer. Google launched the service as an alternative to SMS-based one-time pass codes. While SMS-based codes […]
March 6, 2020 by Vertical Axion
Nemty Ransomware isn’t an especially well-known threat, but it’s dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that’s attempting to spread the ransomware far and wide. An unknown group of hackers are sending out what appear to be love letters from secret admirers in a broad pattern. They […]