Blog
November 28, 2022 by Vertical Axion
Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like “Caffeine.” Through an open registration procedure, anyone who wishes to launch their phishing campaign can sign up on these …
Read more »
Tagged
November 26, 2022 by Vertical Axion
Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on the hackers’ websites. These documents date from several years ago until November 24, …
November 25, 2022 by Vertical Axion
According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device remotely. Microsoft announced the issue in a brief blog post, stating that its …
November 24, 2022 by Vertical Axion
In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As a result, almost 15,000 sites have been compromised. In September 2022, researchers at Sucuri discovered the attacks. Each compromised site …
November 23, 2022 by Vertical Axion
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and Halloween. The kit combines several methods and employs several evasion detection techniques to …
November 22, 2022 by Vertical Axion
Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers update their systems immediately. The flaws make it possible for cybercriminals to deactivate the …
November 21, 2022 by Vertical Axion
The feature is comparable to Apple’s ‘App Tracking Transparency. However, unlike Apple, DuckDuckGo’s method does not rely on app developers’ compliance with user choice. All known trackers are blocked. According to DuckDuckGo, Android users have an average of 35 applications …
November 18, 2022 by Vertical Axion
David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel 6 and Pixel 5 devices, allowing anybody with physical access to the smartphone to unlock it. Bypassing the lock screen …
November 16, 2022 by Vertical Axion
When you’re a business owner, you always look for ways to streamline processes and improve efficiency. A single sign-on (SSO) system is a great way to simplify authentication. It allows users to access multiple applications with just one login credential, …
November 15, 2022 by Vertical Axion
It’s getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto Networks’ Unit 42 revealed that the use of Software as a Service to …
November 12, 2022 by Vertical Axion
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it. Encryption transforms readable data into an unreadable format, making it difficult for unauthorized …
November 11, 2022 by Vertical Axion
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates malware to major media outlets across the United States. More than 250 …
November 10, 2022 by Vertical Axion
According to Microsoft’s latest announcement, businesses should assess security measures to defend against evolving cyber-security threats. Microsoft released its Digital Defense Report (MDDR) for 2022. Microsoft released alarming statistics about the cyber threats that the company has faced in the …
November 8, 2022 by Vertical Axion
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that VPNs are becoming a severe threat to their …
November 7, 2022 by Vertical Axion
It’s no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was compromised. This allowed attackers access to 130 code …
November 5, 2022 by Vertical Axion
Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon’s prepaid wireless accounts, compromising approximately 250 individuals. According to a letter to customers, Verizon discovered …
November 3, 2022 by Vertical Axion
There is no doubt that Zoom has become very popular in the business and academic sectors, as it is widely used for video conferencing and voice-over IP (VoIP). Zoom issued a security bulletin at the beginning of October, informing users …
November 2, 2022 by Vertical Axion
Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email campaigns that pose as expensive memberships to confuse recipients who have never …
October 31, 2022 by Vertical Axion
An advanced PHP variant of the Ducktail malware poses a risk to Facebook users. On October 13th, 2022, ZScaler, a cloud security firm, published a blog post detailing this latest discovery. The new PHP version is being distributed by “pretending …
October 29, 2022 by Vertical Axion
Microsoft announced the Azure DDoS IP Protection released as a public preview on October 19, 2022. Small and medium-sized businesses (SMBs) can now benefit from DDoS protection with a pricing model customized to their specifications. DDoS Protection provides similar capabilities …
October 27, 2022 by Vertical Axion
Fortinet addressed a critical vulnerability that gave remote access to numerous services and was being exploited by threat actors in the wild. The company described the vulnerability as an authentication bypass on the admin interface, allowing unauthenticated users to connect …
October 24, 2022 by Vertical Axion
In light of a recent data breach, the City of Tucson, Arizona, is alerting approximately 123,000 citizens that their personal information has been compromised. The issue was detected in May 2022, but the city’s investigation didn’t conclude until last month.…
October 22, 2022 by Vertical Axion
According to a new Akamai analysis, the company’s experts classified about 79 million domains as dangerous in the first half of 2022; based on a NOD (newly observed domain) dataset, this is about 13 million malicious domains per month, representing …
October 20, 2022 by Vertical Axion
After a source code leak was posted by an unidentified third party on 4chan and GitHub last week, the technology giant Intel has confirmed that confidential source code related to its Alder Lake CPUs has been leaked. The disclosed information …
507-388-3880