Blog
December 2, 2022 by Vertical Axion
The new security-focused data lake solution from Amazon Web Services (AWS), unveiled at re:Invent 2022, aims to give consumers more value from their security data. The Amazon Security Lake service aims to consolidate an organization’s security data from various on-premises …
Read more »
Tagged
November 30, 2022 by Vertical Axion
The FBI warns about scammers pretending to be refund payment gateways from financial institutions to steal sensitive information from unsuspecting victims. The federal law enforcement agency stated that scammers deceive victims into granting them access to their computers via email …
November 29, 2022 by Vertical Axion
Earlier this year, Twitter confirmed that an API vulnerability had caused a massive data leak containing non-public information for over 5.4 million Twitter users. Twitter denied claims that hackers had leaked the private information priorly. However, Pompompurin, the owner of …
November 28, 2022 by Vertical Axion
Threat actors may now launch their own sophisticated assaults thanks to the emergence of Phishing as a Service (PhaaS) platforms like “Caffeine.” Through an open registration procedure, anyone who wishes to launch their phishing campaign can sign up on these …
November 26, 2022 by Vertical Axion
Data allegedly stolen from Cincinnati State Technical and Community College has been leaked after Vice Society attacked the campus. Many of the stolen documents were posted on the hackers’ websites. These documents date from several years ago until November 24, …
November 25, 2022 by Vertical Axion
According to cybersecurity experts at Cisco Talos, Microsoft Office has a high-severity vulnerability that could allow prospective cyber attackers to execute malicious code on the target device remotely. Microsoft announced the issue in a brief blog post, stating that its …
November 24, 2022 by Vertical Axion
In a massive malicious SEO campaign, cybercriminals are promoting low-quality Q&A sites by redirecting visitors to fake discussion forums. As a result, almost 15,000 sites have been compromised. In September 2022, researchers at Sucuri discovered the attacks. Each compromised site …
November 23, 2022 by Vertical Axion
Security experts at Akamai have discovered a campaign that uses an elaborate phishing kit. This campaign targets Americans using lures centered around holidays like Labor Day and Halloween. The kit combines several methods and employs several evasion detection techniques to …
November 22, 2022 by Vertical Axion
Lenovo reports that it has patched two critical security flaws that affected several of its ThinkBook, IdeaPad, and Yoga laptops. Lenovo is also recommending that consumers update their systems immediately. The flaws make it possible for cybercriminals to deactivate the …
November 21, 2022 by Vertical Axion
The feature is comparable to Apple’s ‘App Tracking Transparency. However, unlike Apple, DuckDuckGo’s method does not rely on app developers’ compliance with user choice. All known trackers are blocked. According to DuckDuckGo, Android users have an average of 35 applications …
November 18, 2022 by Vertical Axion
David Schütz, a cybersecurity researcher, inadvertently discovered a means to circumvent the lock screen on his fully updated Google Pixel 6 and Pixel 5 devices, allowing anybody with physical access to the smartphone to unlock it. Bypassing the lock screen …
November 15, 2022 by Vertical Axion
It’s getting easier than ever to conduct effective phishing campaigns thanks to the rise in popularity of SaaS platforms. A recently published report released by Palo Alto Networks’ Unit 42 revealed that the use of Software as a Service to …
November 12, 2022 by Vertical Axion
As our world becomes increasingly digitized, businesses are finding themselves at a greater risk of cyberattacks. One way companies can protect their data is by encrypting it. Encryption transforms readable data into an unreadable format, making it difficult for unauthorized …
November 11, 2022 by Vertical Axion
A cyber-security threat actor known as SocGholish has compromised a JavaScript code used by an unnamed media content provider. The malware is being used to spread the FakeUpdates malware to major media outlets across the United States. More than 250 …
November 10, 2022 by Vertical Axion
According to Microsoft’s latest announcement, businesses should assess security measures to defend against evolving cyber-security threats. Microsoft released its Digital Defense Report (MDDR) for 2022. Microsoft released alarming statistics about the cyber threats that the company has faced in the …
November 9, 2022 by Vertical Axion
While holding its Zoomtopia event on November 8, 2022, the video conferencing giant announced the release of two brand-new productivity tools for Zoom users. In addition to the communication and collaboration tools already provided within Zoom, the newly released Zoom …
November 8, 2022 by Vertical Axion
Virtual private networks (VPNs) are used to give users remote access to resources on corporate networks. However, several factors have revealed incompatibilities between VPNs and Zero-Trust security systems. Businesses are worried that VPNs are becoming a severe threat to their …
November 7, 2022 by Vertical Axion
It’s no secret that cyber attacks are on the rise, and that no company is immune to them. Dropbox, a cloud storage company, was the lastest victim when their GitHub account was compromised. This allowed attackers access to 130 code …
November 5, 2022 by Vertical Axion
Recently, Verizon experienced a minor but significant data breach. Between October 6, 2022, and October 10, 2022, an unknown malicious actor gained access to Verizon’s prepaid wireless accounts, compromising approximately 250 individuals. According to a letter to customers, Verizon discovered …
November 3, 2022 by Vertical Axion
There is no doubt that Zoom has become very popular in the business and academic sectors, as it is widely used for video conferencing and voice-over IP (VoIP). Zoom issued a security bulletin at the beginning of October, informing users …
November 2, 2022 by Vertical Axion
Phishing is one of the oldest forms of cybercrime. It continues to grow and evolve, making it difficult for people to defend themselves. Callback phishing scams are email campaigns that pose as expensive memberships to confuse recipients who have never …
November 1, 2022 by Vertical Axion
DuckDuckGo announced on October 18, 2022, that the beta version of its Mac desktop app is now available for all Mac users. DuckDuckGo is a browser that focuses on privacy. It has many new features designed to make web browsing …
October 31, 2022 by Vertical Axion
An advanced PHP variant of the Ducktail malware poses a risk to Facebook users. On October 13th, 2022, ZScaler, a cloud security firm, published a blog post detailing this latest discovery. The new PHP version is being distributed by “pretending …
October 29, 2022 by Vertical Axion
Microsoft announced the Azure DDoS IP Protection released as a public preview on October 19, 2022. Small and medium-sized businesses (SMBs) can now benefit from DDoS protection with a pricing model customized to their specifications. DDoS Protection provides similar capabilities …
507-388-3880