Blog
April 9, 2021 by Vertical Axion
Taiwanese tech giant Acer is the latest company to fall victim to relentless hackers. What makes the Acer breach especially noteworthy is the fact that the group behind the attack is demanding a fifty-million-dollar ransom, which is the highest figure …
Read more »
Tagged
April 8, 2021 by Vertical Axion
If you don’t spend much time in the Apple ecosystem, you may not realize that Xcode is a completely legitimate tool used in macOS for developing a wide range of software and applications. Recently, based on research conducted by SentinelLabs, …
April 7, 2021 by Vertical Axion
A large US hacker collective claimed credit for something you may not have heard of yet called “#OperationPanopticon.” According to the group behind the attack, they compromised a high level administrator account at a Silicon Valley firm called Verkada, which …
April 6, 2021 by Vertical Axion
For the last month or so, Google has been testing the notion of using HTTPS as the default protocol for all URLs a user types into the address bar. Those who have been experimenting with Chrome’s latest Canary build have …
April 5, 2021 by Vertical Axion
Many industry insiders consider physical security keys used in the context of two-factor authentication login schemes to be the final word in digital security. That is because even if your password is compromised, if you’re using a physical piece of …
April 3, 2021 by Vertical Axion
Clubhouse has taken the internet by storm. Or rather, it has taken the iOS ecosystem by storm, since the company has yet to release an Android version of their increasingly popular app. If you’re not sure what all the fuss …
April 2, 2021 by Vertical Axion
One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We’ve seen a handful of new malware strains introduced in recent months with worm modules added to their code, …
March 31, 2021 by Vertical Axion
If you rely on TCP port 554, you’ll probably want to do a bit of reconfiguration. Last year, security researchers discovered a new version of the NAT Slipstream vulnerability that allowed hackers to deploy malicious scripts in order to bypass …
March 30, 2021 by Vertical Axion
In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being exploited by a persistent threat group known as Halfnium, sponsored …
March 29, 2021 by Vertical Axion
Recently, Microsoft made an announcement regarding the particulars of Windows Server 2022, and there’s a lot to like in terms of built-in protections. That is amazing, even if you’re not especially concerned about security. Here’s a quick overview of what …
March 27, 2021 by Vertical Axion
In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a recent report published by France’s national cybersecurity agency, …
March 26, 2021 by Vertical Axion
Recently, researchers have discovered two new ransomware strains, dubbed “AlumniLocker” and “Humble”, both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of the larger ransomware threat and underscores the fact …
March 24, 2021 by Vertical Axion
Most apps these days make use of cloud storage in order to minimize their footprint on your device. That’s good in theory, but based on new research from Zimperium, a disappointing percentage of app developers don’t do nearly enough to …
March 22, 2021 by Vertical Axion
In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose not to encrypt files and demand payment or …
March 20, 2021 by Vertical Axion
Macros have been a simple, effective means of spreading malware since the 1990’s, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It’s a long standing issue that many companies have attempted to address over …
March 19, 2021 by Vertical Axion
Recently, two different security researchers (Clement Lecigne of Google’s Threat Analysis Group, and Alison Huffman from Microsoft’s Browser Vulnerability Research Group) discovered a pair of serious security vulnerability impacting Apple devices. The bugs, tracked as CVE-2021-1844 and CVE-2021-21166 respectively, are …
March 18, 2021 by Vertical Axion
There’s a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that makes use of SendGrid and convincing replicas of …
March 17, 2021 by Vertical Axion
Microsoft has been busy of late, making a raft of improvements to their email system that are designed to enhance user security. Not long ago, they added a fantastically useful feature called ‘Plus Addressing’ which allows Office 365 users to …
March 15, 2021 by Vertical Axion
A few months ago, it became widely known that there was a critical security vulnerability in Accellion FTA servers. Naturally, hackers wasted no time exploiting the vulnerability, and since then, we’ve seen a few instances of high-profile data breaches traced …
March 12, 2021 by Vertical Axion
Strange things are afoot at Kia Motors America (KMA), a subsidiary of Kia Motors with more than 800 dealerships scattered across the United States. Recently the company has reported a nationwide IT outage that is impacting their mobile UVO Link …
March 10, 2021 by Vertical Axion
Barely a week ago, Patrick Wardle announced the discovery of the first piece of malware capable of slipping past the defenses of Apple’s M1, which was considered to be among the most secure commercially available technology. Now, it seems, there …
March 6, 2021 by Vertical Axion
Kroger, a titan in the US supermarket industry, is the latest company to fall victim to a data breach. In this case, the breach came about via a third-party service the company utilized called Accellion FTA. Hackers were able to …
March 5, 2021 by Vertical Axion
If you’re a Google Chrome user, then you’ve probably already used or at least seen the Password Checkup feature in action. It’s the little popup box you see when you type in a password to a website that requires a …
March 4, 2021 by Vertical Axion
Hackers have found a new tool in their never-ending quest to cause trouble. They’ve begun abusing the Apps Script business application developed by Google in a bid to steal credit card and personally identifiable information. That’s significant because given Google’s …
507-388-3880