vishing bazarcaller

BazarCaller – Vishing Gang

BazarCaller is a new cybercrime gang that uses Vishing to trick its victims into handing over information or access to a device. Vishing is the malicious practice of making phone …

quarantine cybrary

Quarantine

Quarantine in the cybersecurity world happens when files containing malware are placed into isolation for future disinfection or examination. This strategy puts the malware in a specific area of the …

europol emotet takedown

Emotet Operation Takedown

In January of 2021, law enforcement and judicial authorities across the globe disrupted one of the most notable botnets of the past decade: Emotet. Investigators have taken control of its …

mac malware article

Malware in Macs

MAC Malware has grown faster than Windows Malware in the last 24 months. If you bought a MAC because it was “safer” think again and learn all the types of malware that’s impacting these systems. Become more aware to become more secure especially with respect to MAC hardware.

Bug Bounty Programs

A Bug Bounty Program is a deal that is offered by many websites, organizations, and software developers where individuals can receive recognition and monetary payment for reporting bugs or vulnerabilities …

spearphishing attack

Spear-Phishing

Spear-Phishing is a form of phishing attack that targets a specific person or organization, seeking access to sensitive information. Similar to phishing, this is done through spoofing emails that appear …

Whaling

Whaling refers to malicious hacking that targets high-ranking executives. Similar to phishing, whaling is where the hacker hunts for data that they can use, but they focus on high-ranking bankers, …

Insider Threat 201

Malicious Code

Malicious Code, or sometimes known as “Attack Code” is a program code intended to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or …

How to Protect Yourself From Malware

Malware

Malware is software that compromises the operation of a system by performing an unauthorized function or process. Malware includes viruses, worms, and trojan horses. What Does This Mean For An …

Spyware

Spyware is software that is secretly or surreptitiously installed into an information system without the knowledge of the system user or owner. What Does This Mean For An SMB? Your …

How to Protect Yourself From Malware

Malicious Applet

A malicious applet¬†is a small application program that is automatically downloaded and executed and that performs an unauthorized function on an information system. It is essentially malware that is deployed …

Malicious Logic

Malicious Logic is hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the …

trojan horse cybersecurity breaches

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting …

How to Protect Yourself From Malware

How to Protect Yourself From Malware

This short 3 min video outlines how to combat malware by preventing it from being installed in the first place.¬† It outlines how to keep computer security up-to-date with patching, …

Ransomware

Ransomware is a type of malicious software designed to block access to a computer system, and more importantly the critical data it contains, until a sum of money or ransom …