The Dangers of Near-Constant Phishing Attacks

For 20 years, hackers have tried to breach organizational networks by finding or breaking holes in the network’s perimeter, or in exposed servers. This led to the cybersecurity industry creating software designed specifically to stop these threat actors in the act. This, in essence, created a situation where the perimeter of an organization’s network was […]

The OnePercent Group: A Different Approach to Ransomware

A recent trend even amongst ransomware threats is that the FBI is issuing warnings regarding how dangerous it is or how difficult certain variants are. This particular threat — the OnePercent ransomware gang — is no exception. Let’s break down what you need to know about the OnePercent Group and how you can prepare to […]

The Colonial Pipeline Attack is Important to Cybersecurity

The situation surrounding the hack against Colonial Pipeline has only become more complex as new information has come to light, each new discovery providing more insights and potentially actionable takeaways. Let’s examine some of the biggest developments surrounding the attack, and what they will likely mean for overall cybersecurity from this point forward.

What Can Be Done to Counter COVID-19-Themed Scams?

As commonly happens with any disaster, COVID-19 has inspired no short supply of scams. While these scams initially focused upon the relief funds that were delivered to people to help sustain the suffering economy, the ongoing vaccine distribution efforts have given those behind these efforts a new means of attack. Let’s consider how these scams […]