online shopping

Most Popular Brands Imitated For Phishing Attempts

Familiar companies like Google, Microsoft and Amazon are among Check Point Research’s top list of brands that cybercriminals tend to impersonate most often when it comes to phishing attacks. DHL took the lead as the brand most often used in phishing campaigns and email scams in the Q4 Brand Phishing Report for 2021. The second […]


Google Docs “Comments” Feature Is Being Targeted By Hackers

Malicious links are being sent to Outlook users in a recent phishing campaign attempt. The attacks, which were identified last month, have been difficult for victims and email scanners to identify. Researchers from Avanan discovered that Google Docs, Sheets and Slides could be used to spam emails back in October, however there has been no […]

A Popular Fisher-Price Toy Might Be Spying On You

A Mattel classic might actually be a Christmas nightmare. For its 60th anniversary, the toy company upgraded one of its classics –the Fisher-Price Chatter telephone– with Bluetooth capabilities. Meaning, a phone intended for kids can now be used for both children and adults in order to make working phone calls. What could possibly go wrong, […]

Log4j Updated: How To Ask Your Provider For Remediation

About a week ago, we posted a blog detailing the Apache Log4j vulnerability and the necessity of contacting your software and website vendors regarding what, if anything, has been or needs to be done regarding this issue. If you still have not contacted your vendors, an example email for remediation can be seen below. Bolded […]

Alert! Apache Log4j Vulnerability: Read The Security Advisory

A critical (CVSS 10.0) remote code execution (RCE) vulnerability titled CVE-2021-44228 has been disclosed by the Apache Log4j Project on December 10th, 2021. This alert only affects you if yourself or your hosting service is using Apache web server software. Specifically, it’s affecting Log4j2<= 2.14.1. To read the security advisory, click here. To view the […]

dell computer

Insider Threat Led To Data Breach At Ubiquiti

Think protecting yourself from external threats is all you need to do to maintain strong cybersecurity? Think again. FBI and DoJ investigators claim an employee from Ubiquiti stole data from the company, then acted as a whistleblower to divert attention away from himself. According to a recently unsealed grand jury indictment, Nicolas Sharp attempted to […]

Who Really Needs To Know You’re Out Of The Office?

Are your automatic email replies putting you at risk? What may seem like a courteous, polite notice to let others know you’re not available could be used against you. Cybercriminals might be looking out for these types of notices, because it gives them a chance to spoof you while you’re gone. There’s also a lot […]

Did You Accidentally Download A Banking Trojan From Google’s Play Store?

Android users may have made themselves vulnerable to the malware between August and November of 2021. Over 300,000 devices were affected due to four distinct trojans having spread via dropper apps. Cybercriminals are improving their tactics in order to bypass Google’s app security checks, and it’s working. Machine learning and automation have difficulty in detecting […]

GoDaddy Data Breach Left 1.2 Million Users Vulnerable, Exposed

The web hosting platform’s chief information security officer (CISO) has notified the Securities and Exchange Commission of an unauthorized breach. Systems that host and manage WordPress servers were affected. According to GoDaddy, the unauthorized individual accessed the systems around September 6th using a compromised password, and the company discovered the breach on November 17th. About […]

Urgent Intel Processor Problem Could Affect Laptops, Medical Devices

The Intel chip flaw has the potential to affect cars and embedded systems, researchers have found. The issue in question, CVE-2021-0146 allows testing or debugging modes on multiple processors, whereby an unauthorized person could utilize physical access to gain enhanced privileges. This particular bug was found in Pentium, Celeron and Atom processors of the Apollo […]