Critical Microsoft Vulnerabilities

Infrequently, Microsoft released critical vulnerability alerts and patches that are so important to know about, that you should stop what you’re doing and review them and plan to patch as soon as possible. This is one of those times.

Social Media Bots

In addition to Malware Bots that do the bidding of a hacker, there are also social media “bots”.  These bots refer to automated social media accounts that publish lots of …

IDS

Network-Based Intrusion Prevention

Network-based Intrusion Prevention Services (aka NIPS) is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like network intrusion detection systems (NIDS), Network-based Intrusion Prevention System (NIPS) monitors …

Risk Reduction (Limitation)

Risk Reduction (limitation) is the most common risk management strategy used by businesses. This strategy limits a company’s exposure by taking some action. It is a strategy employing a bit …

Compromised Credentials

Compromised credentials are rampant online. Over 82% of breaches relate back to stolen passwords and phishing attacks. Learn what to do about it.

HowTo: Add a New Client to CyberHoot

This video was created specifically for MSP’s with SuperUser access to CyberHoot and its multi-tenant deployments.  Regular Administrators will not have access to these menus. This video provides you a …

Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into …