Blog
November 4, 2020 by Vertical Axion
Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google’s. In recent months, the company has removed nearly a …
Read more »
Tagged
November 3, 2020 by Vertical Axion
Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your business critical files. Others are designed to hit …
October 31, 2020 by Vertical Axion
Deep Fakes are becoming an increasingly large problem. If you’re not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a video is digitally overwritten by some other person.…
Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer’s processing power to do it. GravityRAT is a …
October 30, 2020 by Vertical Axion
WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they’re taking a different approach. They’re forcing a security …
October 29, 2020 by Vertical Axion
Score one for the good guys. A team led by Microsoft’s DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen’s Black Lotus Labs is working on something new. They have launched a sustained, coordinated attack on Trickbot’s …
October 28, 2020 by Vertical Axion
If you make frequent use of Adobe products, then you’ll definitely want to give priority to applying the latest security update offered by the company. It’s an out of band patch that impacts ten different products in the Adobe lineup …
October 27, 2020 by Vertical Axion
A great many malware strains are designed to engage quietly during a PC’s startup process and then idle in the background. They are in the system logging keystrokes, taking screen shots at periodic intervals and uploading them to a command …
October 23, 2020 by Vertical Axion
Intel has had more than its share of challenges over the last couple of years. Not the least of which included a whole family of new attack vectors that made headlines and caused panic around the world. This happened as …
October 22, 2020 by Vertical Axion
Selling network access is big business on underground hacking websites. Even worse, the business is growing at an alarming rate, according to a report recently published by cyber security firm KELA. According to their report, the number of ads found …
October 20, 2020 by Vertical Axion
The year 2020 could well be described as the Year of Ransomware. Security researchers around the globe who monitor such things have noted a sharp uptick in the use of ransomware this year, with well known threats like REvil, Ryuk, …
October 19, 2020 by Vertical Axion
Are you an Office 365 user? If so, be aware that Microsoft is adding some powerful new protections to the software suite, designed to make you safer. Hackers commonly target Office 365 users with a type of attack known as …
October 15, 2020 by Vertical Axion
Hackers are relentless when it comes to testing the boundaries of software for potential weaknesses to exploit. It seems that an unknown group of hackers has found a new one. Based on what researchers at Malwarebytes are seeing, a group …
October 14, 2020 by Vertical Axion
Security researchers at Netlab have recently reported on their discovery of a terrifying new botnet on the web. Dubbed HEH, this botnet is a different sort of threat. Unlike most others, this one is not designed to launch DDOS attacks …
October 13, 2020 by Vertical Axion
If you’ve got an NVIDIA graphics card in your PC, and odds are pretty good that you do, be aware that the company recently released a security update. It patches a number of high severity vulnerabilities in the Windows GPU …
October 10, 2020 by Vertical Axion
Hackers have long used the lure of software cracks to infect unsuspecting users, but recently, a new group is making waves and finding significant success in using the Exorcist 2.0 ransomware to lock a user’s files and extort them. It’s …
October 9, 2020 by Vertical Axion
Does your business rely on QNAP NAS storage devices? If so, be aware that the company recently issued an advisory, stating that an unknown group of hackers has begun targeting them specifically with ransomware attacks. The advisory reads, in part, …
October 8, 2020 by Vertical Axion
If you’re a fan of the luxury fashion brand Louis Vuitton, be advised that the company recently and quietly fixed an issue on their website that may have been exploited by hackers before the company became aware of it. The …
October 2, 2020 by Vertical Axion
Do you use the Strava app when you run or bike? If so, it may be sharing your personal information in ways you hadn’t expected. Andrew Seward, the head of Data and Product Development at Experian was out for a …
October 1, 2020 by Vertical Axion
You may not be familiar with the name Luxottica, but the Italian-based eyewear manufacturer is the largest company of its kind in the world. It has popular brands such as Ferrari, Michael Kors, Ray-Ban, Armani, Coach, and others in its …
September 30, 2020 by Vertical Axion
There’s a new threat actor on the hacking world stage, going by the name “OldGremlin”, and they’re causing some serious damage to corporate networks around the world. The group’s malware campaign seems to have begun back in March of this …
September 29, 2020 by Vertical Axion
Hackers aren’t picky when it comes to target selection, and no one is safe. Unfortunately, that includes the Department of Veterans Affairs, which recently disclosed that a hacker successfully breached their system and made off with personal information belonging to …
September 28, 2020 by Vertical Axion
If you’re a customer of US retail chain Staples, you may have recently received a notification from the company regarding a problem with their Order Tracking system. According to information in the notification, the data was left exposed due to …
September 24, 2020 by Vertical Axion
Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself. There are a number of executables residing within the Windows operating system, …
507-388-3880