Backups are an organization’s last line of defense against ransomware, because comprehensive, offline, offsite backups give you a chance to restore…
Month: March 2023
Steer clear of this EE phish that wants your card details
Watch out for this piece of spam lurking in mail boxes and claiming to be from the EE mobile network. The…
3 tips to raise your backup game
If there was an award for “most overlooked really important thing in computing”, backups would win. Every year. So let’s put…
Update now! Apple fixes actively exploited vulnerability and introduces new features
Apple has released security updates for several products. Most notably one of the updates fixes an actively exploited vulnerability in the…
Smart home assistants at risk from “NUIT” ultrasound attack
A new form of attack named “Near Ultrasound Inaudible Trojan” (NUIT) has been unveiled by researchers from the University of Texas….
“BingBang” flaw enabled altering of Bing search results, account takeover
Researchers from Wiz have discovered a way to allow for search engine manipulation and account takeover. The research in question focuses…
[Updated April 3] 3CX desktop app used in a supply chain attack
Researchers have found that the 3CX desktop app may be compromised and used in supply chain attacks. The 3CX Desktop App…
Stopping the top 5 cyber threats of 2023: A Threat Intel webinar recap
In an ever-changing cybersecurity landscape, businesses must remain alert to evolving cyber threats. Our recent webinar featured cybersecurity experts Jérôme Segura…
“Log-out king” Instagram scammer gets accounts taken down, then charges to reinstate them
A fraudster going by “OBN Brandon” has been defrauding Instagram influencers and entertainment figures out of hundreds of thousands of dollars…
Fake DDoS services set up to trap cybercriminals
The “online criminal marketplace” has been disrupted via several fake Distributed Denial of Service (DDoS) tools, according to an announcement from The British National…