Malicious actors routinely use current events to lure victims into downloading their malware. For example, one such entity registered the windows-upgraded.com domain on January 27, 2022, the day after Microsoft announced the final phase of … Read More
3 Troubling Trends in Data Compromise Attacks
As part of its mission to help educate businesses about identity crimes, the Identity Theft Resource Center has released its annual data breach report. Learn about three troubling trends discussed in that report. The Identity … Read More
Legal IT Support Services: IT Support for Law Firms in Brea, CA
Technology plays a massive role in the legal industry. From managing client data to drafting contracts, law firms rely on technology each and every day. So, when something goes wrong with the technology, it can … Read More
Memento Ransomware Uses WinRAR to Lock your Files
Ransomware prevents its victims from accessing its own files until they comply with the attackers’ demands, which is usually a monetary payment. The traditional method of accomplishing this task is to encrypt files with the … Read More
What You Need to Know about Cybersecurity Compliance
Due to the increasing number of cybersecurity-related laws, regulations, and standards, many companies might discover that they now need to comply with one or more of them. Here is what you need to know if … Read More
3 of the Most Troubling Cyberattacks in 2021
Cybercriminals were very busy in 2021. Here are three of the most troubling cyberattacks they perpetrated. The year 2021 was a busy year for cybercriminals — and for the US Federal Bureau of Investigation’s (FBI’s) … Read More
UpdateAgent is Back with a Vengeance
Analysts at Microsoft Security Intelligence have discovered a new variant of UpdateAgent, also known as WizardUpdate. This malware targets Mac devices by impersonating legitimate MacOS software. UpdateAgent has been in use since 2020, but the … Read More
Supply Chains are Getting Attacked by Hackers
Gaining access to a company that provides products or services for other organizations is an effective way for hackers to attack many targets at once. As a result, businesses that are part of a supply … Read More
A New Ransomware Has Been Discovered
Cyber criminals are using a new ransomware dubbed Yanluowang to encrypt a target network’s files. This ransomware is so named because it places an extension of “yanluowang” on the files it encrypts. In addition to … Read More
Beware of QR Code Scams
Businesses use Quick Response (QR) codes to provide a variety of services for their customers, such as locating apps for ordering a product and tracking shipments. They aren’t human readable, which allows scammers to easily … Read More