North Korea needs money. They are not the economic powerhouse they had tried to be. In fact, the Dear Leader admitted in January that the economy was a total failure, despite posters showing the contrary. Other nation-states may hack primarily for information, but North Korea hacks primarily for money. The North Koreans may be short … Continue reading Anyone Want Some North Korean Cybersecurity Protection?
It's becoming a common story. Experienced hacking groups use vulnerabilities in widely used third-party software to gain entrance to an enterprise's network. In the most recent case, the Clop ransomware gang leveraged a zero-day vulnerability in a widely used file transfer program from Accellion to penetrate university networks, as well as a number of other … Continue reading University of California, University of Colorado, University of Maryland, Stanford, University of Miami, and Others Snared in Extortion Attacks
It's become almost axiomatic that malware attacks of all varieties begin with a phishing email. Most enterprises teach their employees how to deal with such attacks, how to identify a phishing email, how to avoid dangerous links, and how to identify malicious attachments. Yes, this information does help, but what if your employee becomes an … Continue reading How Using Google Search can Lead to a Ransomware Attack on Your Company
If you've done enough browsing, you've undoubtedly tried to navigate to a website only to be redirected to another page. Then, in order to get to the page you want, you have to cancel that page. Sometimes you have to do this several times. For the most part, this is nothing more than an annoyance. … Continue reading Those Annoying Pop-Ups may be More Dangerous than You Think