Blog
June 10, 2022 by Vertical Axion
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware products that are impacted by recently disclosed critical security flaws, either patch them immediately or remove them from your …
Read more »
Tagged
June 9, 2022 by Vertical Axion
If you’re not familiar with the term, a Zero Day exploit is a security flaw that the software vendor is not aware of and hasn’t yet patched. In many (but not all) cases, Zero Day Vulnerabilities will also have publicly …
June 8, 2022 by Vertical Axion
Phishing campaigns get more effective the more closely they can imitate a trusted source. Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of malware on the …
June 7, 2022 by Vertical Axion
Security researchers employed by Microsoft have recently spotted a variant of the Sysrv botnet. They have dubbed the new variant Sysrv-K. This new variant works in two ways. First, it exploits a flaw in the Spring Cloud Gateway that allows …
June 6, 2022 by Vertical Axion
HP recently released a BIOS update to address a pair of high-severity vulnerabilities that affect a wide range of PC and notebook products offered by the company. In both cases, the vulnerabilities would allow an attacker to execute code arbitrarily …
June 4, 2022 by Vertical Axion
Do you use a Zyxel firewall? If so, there’s good news. The company has fixed an issue you may not have even been aware that you had. The company pushed out the fix in a silent update a little over …
June 1, 2022 by Vertical Axion
At least one group of hackers has learned a new trick you need to be aware of. Security researchers at Kapersky Lab have discovered a malicious campaign-in-progress that is using event logs to store malware. That is a technique that …
May 31, 2022 by Vertical Axion
The name Kevin Beaumont may not be familiar to you, but if you’re a Linux or Solaris user, he may have just saved you a whole lot of grief. Recently, Mr. Beaumont discovered a stealthy backdoor malware that has been …
May 30, 2022 by Vertical Axion
Hackers around the world are increasingly targeting verified Twitter accounts with emails designed to pilfer your Twitter login credentials. Verified Twitter accounts differ from standard Twitter accounts in that they sport a large blue check mark next to the user’s …
May 28, 2022 by Vertical Axion
The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most ransomware campaigns do. It gets inside a corporate network, exfiltrates the data that it wants, then seems to encrypt the …
May 27, 2022 by Vertical Axion
Google SMTP relay service is wildly popular and used every day by legions of users. Unfortunately, hackers around the world are aware of this and increasingly they’ve begun abusing the SMTP relay service. The basic idea is as follows. Some …
May 26, 2022 by Vertical Axion
Google has been making some fantastic changes to bolster user security in recent weeks. That includes changes to their Google Play Store that will require developers to disclose exactly what data they plan to track and collect when users install …
May 24, 2022 by Vertical Axion
Some interesting and disturbing changes are afoot in the hacking world. It appears that the TrickBot gang is now working for the Conti Syndicate. TrickBot is a well-known group of botnet developers responsible for the creation of the BazarLoader. BazarLoader …
May 23, 2022 by Vertical Axion
There’s a big change coming to the Microsoft Edge browser. Big enough that it may prompt some users to switch to Edge. Recently, Microsoft announced that they’ll be adding a free built-in VPN (Virtual Private Network) service to Edge as …
May 21, 2022 by Vertical Axion
How many “smart” devices do you have connected to your home or company network? It’s probably a higher number than you originally estimated. However large that number is, it pays to be aware that IoT devices are some of the …
May 20, 2022 by Vertical Axion
Researchers at Bitdefender have discovered a new malware campaign. This one uses an attack method that has fallen out of favor in recent months, called the Exploit Kit. Exploit Kits used to be all the rage. Flash Player was a …
May 19, 2022 by Vertical Axion
A handy new Google Assistant is coming soon to a device near you. The new feature is designed to automate the frustrating and often time-consuming task of changing your passwords after a breach. This information is according to a tweet …
May 17, 2022 by Vertical Axion
A small but important change is coming to your Android apps. Soon you’ll notice a new Data Safety section on the Google Play Store which will provide greater transparency about exactly what data the apps you install are collecting. The …
May 16, 2022 by Vertical Axion
There’s a new hacking campaign underway that you need to be aware of especially if you or anyone you know is interested in upgrading to Windows 11. The campaign appears to be a legitimate offer from Microsoft and it gives …
May 13, 2022 by Vertical Axion
If you rely on a Microsoft Exchange server to handle email for your company, there is something you should be aware of. Recent research by security and analytics company Varonis has discovered that an affiliate of Hive ransomware has begun …
May 11, 2022 by Vertical Axion
Do you have an Android device? Is it built around a Qualcomm or MediaTek chipset? If you answered yes to both of those questions, be aware that researchers at Check Point have recently discovered an issue which could put your …
May 10, 2022 by Vertical Axion
Considered to be social media for professionals, LinkedIn is an invaluable tool for millions of people all over the world and a great way to make a wide range of professional connections. Unfortunately, hackers and scammers are aware of this …
May 9, 2022 by Vertical Axion
Millions of people around the world have leveraged the awesome power of WordPress to build their sites. Whether for personal or business use, WordPress has the flexibility and functionality to create just about any type of site you can dream …
May 7, 2022 by Vertical Axion
The owners of the Qbot botnet are changing things up. The botnet’s normal Modus Operandi for distributing their signature Qbot malware has been to push their malicious code via phishing emails which contain Microsoft Office documents laden with poisoned macros. …
507-388-3880