Cybersecurity Awareness Month – Passwords
Duplicate this article and then edit it to create easy to complete Blog articles.
Weekly blog articles covering current, critical cybersecurity topics to help the world become more aware and more secure.
Duplicate this article and then edit it to create easy to complete Blog articles.
Ransomware costs continue to increase year over year for SMBs. News headlines talk about multi-million dollar Ransomware breach costs, but those apply primarily to enterprises. For the average SMB, the costs are in the hundreds of thousands of dollars. $139,000 to be exact or 65% more than last year ($84,000).
Preparations have never been more important or simple for SMBs to train up their employees to fight the scourge of cyberattacks.
Ransomware costs continue to increase year over year for SMBs. News headlines talk about multi-million dollar Ransomware breach costs, but those apply primarily to enterprises. For the average SMB, the costs are in the hundreds of thousands of dollars. $139,000 to be exact or 65% more than last year ($84,000).
Preparations have never been more important or simple for SMBs to train up their employees to fight the scourge of cyberattacks.
Duplicate this article and then edit it to create easy to complete Blog articles.
The Morgan Stanley data breach of 2022 where surplus equipment was sent to a 3rd party for data destruction but ended up on eBay is a lesson’s learned treasure trove. From Data Retention and Destruction process failures to contract failures to 3rd party risk management failures, there are plenty of improvement opportunities for SMBs and MSPs to learn from here. This article highlights how you can improve your cybersecurity program from the failures of this breach.
Mon. Aug. 29th Update: CyberHoot isn’t the only one to caution about throwing the Baby out with the Bath Water when reacting to the LastPass password management company breach. Here …
CyberHoot monitors for trends in attacks whether against organizations or individuals. Recently we learned of a growing trend in which Internet profiteers and porn websites are abusing woman through the …
Secure your business with CyberHoot Today!!! Sign Up Now Customers from over 300 restaurants’ had payment card details stolen in web-skimming campaigns targeting three online ordering platforms. Web-skimmers, or Magecart …
CyberHoot Vulnerability Alert Management Process (VAMP) Rating: Critical/Red July 19th, 2022: CyberHoot has learned of multiple Microsoft and Adobe vulnerabilities that can allow for Remote Code Execution (RCE) on your devices that …
Secure your business with CyberHoot Today!!! Sign Up Now China has landed in the middle of one of the largest data breaches of all time after a government developer wrote …
Secure your business with CyberHoot Today!!! Sign Up Now Token Ring the new company (not the old networking token ring technology), just received Series C investment that will accelerate growth …
Secure your business with CyberHoot Today!!! Sign Up Now We’re constantly receiving emails, text messages, and phone calls from scammers claiming to be reputable brands we use. What you may …
Secure your business with CyberHoot Today!!! Sign Up Now Insurers are drafting more restrictive and prescriptive insurance policy requirements designed to reduce the number of claims and better protect themselves …
CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red June 15th, 2022: CyberHoot has learned of multiple Adobe Product vulnerabilities, where the most severe of which could allow for arbitrary code …
Secure your business with CyberHoot Today!!! Sign Up Now A group of engineers at the University of California San Diego has shown for the first time that the Bluetooth signals …
CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red June 7th, 2022: CyberHoot has learned of multiple critical Android vulnerabilities, affecting millions of Android smartphones, that have been patched today. Critical …
Secure your business with CyberHoot Today!!! Sign Up Now Software as a Service (SaaS) applications have transformed businesses over the last decade with enormous value. The pandemic forced many businesses …
CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red May 31st, 2022: CyberHoot has learned of a Remote Code Execution (RCE) bug that can be exploited in Microsoft Office files. Security researcher …
Secure your business with CyberHoot Today!!! Sign Up Now Many malicious email campaigns today leverage Word documents to hide and spread malware, but a recently discovered campaign uses a malicious …
CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red May 25th, 2022: CyberHoot has learned of multiple Google Chrome Web Browser vulnerabilities that could allow for arbitrary code execution. Successful exploitation of …
Secure your business with CyberHoot Today!!! Sign Up Now According to a joint advisory from the U.S. Department of State, the Department of the Treasury, and the Federal Bureau of …
CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red May 19th, 2022: CyberHoot has learned of a number of VMware software vulnerabilities tracked as CVE-2022-22954 (Base score: 9.8/10) and CVE-2022-22960 (Base score: …
Secure your business with CyberHoot Today!!! Sign Up Now The HP Wolf Security threat research team has identified a 2700% increase in Emotet infections in the first quarter of 2022, …
May 16th, 2022: CyberHoot has investigated a SonicWall advisory warning of a trio of security flaws in its Secure Mobile Access (SMA) 1000 appliances, including a high-severity authentication bypass vulnerability. …
Secure your business with CyberHoot Today!!! Sign Up Now In early May 2022, Google, Apple, and Microsoft announced plans to support a common passwordless sign-in standard created by the Fast …
Secure your business with CyberHoot Today!!! Sign Up Now In late April 2022, Google announced they’ve enabled new options for removing Personally Identifiable Information (PII) from Google Searches. Google is …
Secure your business with CyberHoot Today!!! Sign Up Now Anyone who owns a cellphone has likely received an unexpected text message from a number they don’t recognize containing a link …
April 22nd, 2022: CyberHoot has investigated a Java Product vulnerability tracked as CVE-2022-21449 that allows accounts to be remotely exploitable without authentication. In other words, this vulnerability can be exploited …
Secure your business with CyberHoot Today!!! Sign Up Now Cybersecurity remains a top concern for businesses and individuals alike. With each year passing, new technologies emerge to protect you from …
Secure your business with CyberHoot Today!!! Sign Up Now There is a concerning and highly effective strategy that criminal hackers are now using to harvest sensitive customer data from Internet …
Secure your business with CyberHoot Today!!! Sign Up Now Cybersecurity awareness training should be a part of every company’s onboarding routine for all workers. Whether they are in-office or remote …
Secure your business with CyberHoot Today!!! Sign Up Now In January 2021, reports emerged of a backup-targeting ransomware strain called Deadbolt aimed at small businesses, hobbyists, and serious home users. …
March 22nd, 2022: CyberHoot is investigating a potential breach at Okta, developers of a cloud-based identity and access management solution used by thousands of companies world-wide. Okta is currently investigating, …
Secure your business with CyberHoot Today!!! Sign Up Now Co-Authored by Craig Taylor, CEO CyberHoot In a world of deepfakes and misinformation, too many people are tricked by things they …
Secure your business with CyberHoot Today!!! Sign Up Now Korean security analysts have spotted a malware distribution campaign that uses video game ‘cheat’ baits on YouTube to trick players into …
Secure your business with CyberHoot Today!!! Sign Up Now An analysis of data from more than 200,000 network-connected infusion pumps used in hospitals and healthcare entities has revealed that 75% …
Secure your business with CyberHoot Today!!! Sign Up Now In Mid-February 2022, institutions central to Ukraine’s military and economy were hit with a wave of Distributed Denial-of-Service (DDoS) attacks. The …
Secure your business with CyberHoot Today!!! Sign Up Now Co-Authored by Craig Taylor In an ever-changing online world, data breaches continue to increase in frequency and impact. Cybersecurity threats come …
February 18th, 2022: If you’re using PHP in your network, check that you’re using the latest versions, currently 7.4.28 or 8.1.3. Released yesterday [2022-02-17], this version fixes various memory mismanagement …
Secure your business with CyberHoot Today!!! Sign Up Now Malicious attackers have always been a part of the cyber world. And with working from home becoming the new normal, hackers …
Secure your business with CyberHoot Today!!! Sign Up Now Hackers have found a new way to trick unsuspecting users into clicking on phishing links. Attackers use a marketing feature on …
Secure your business with CyberHoot Today!!! Sign Up Now Co-Authored by Craig Taylor In an ever-changing cybersecurity world, data breaches continue to increase in frequency and impact. Cybersecurity threats come …
February 2nd, 2022: CyberHoot has investigated a WordPress vulnerability tracked as CVE-2022-0320, whereby a security flaw can lead to data leakage and more importantly remote code execution. The security gap …
Secure your business with CyberHoot Today!!! Sign Up Now A group of researchers at South Korea’s Gwangju Institute of Science and Technology (GIST) have used natural silk fibers from domesticated …
January 27th, 2022: CyberHoot has investigated a Linux vulnerability tracked as CVE-2021-4034 that is part of most Linux distributions, leads to escalation of privileges up to root, and is trivial …
Secure your business with CyberHoot Today!!! Sign Up Now An important part of running a successful Managed Service Provider (MSP) is ensuring you’re increasing your monthly recurring revenue (MRR). One way …
January 7th, 2022: CyberHoot has investigated a new form of malware known as Malsmoke. This malware is taking advantage of a vulnerability in the way Microsoft digitally signs a specific …
As a Managed Service Provider (MSP), you know your customers are serious about defending against cyberattacks. That’s part of the reason why they hired you. Data breaches are all too …
January 12th, 2022: Today Microsoft sent a notification of a critical risk to those who use Windows devices. The critical bug is CVE-2022-21907, also known as HTTP Protocol Stack Remote …
A wave of phishing attacks has been generated within Google’s cloud-based word processing solution (Google Docs) and its “Comments” feature. Attackers use the commenting feature to send malicious links to …