In corporate America, email is still the go to for communication. It also remains the top threat vector for hackers to gain entry.. The tactics of cyber criminals are evolving every day. Organizations must make sure that they safeguard their channels and prevent...
You’ve probably heard about cities across the U.S. being held hostage by ransomware attacks. It seems like attacks like these are making headlines every couple of months. The story is usually the same, a city agency or perhaps the entire city’s government computers...
While most hacking is illegal, sites like Hacker’s List have gotten a lot of news coverage in recent years. These sites claim that you can hire a hacker anonymously and safely pay them with either your credit card or Bitcoin. While hacker for hire sites may claim...
I recently read Carbon Blacks “Global Incident Response Threat Report” regarding the topic of Island Hopping. If you are not familiar with the term, it’s the act of a hacker gaining access to a network and then infiltrating the supply chain to gain access to clients...
What once required a careful crawl through the dark web is now available on Fiverr. Anyone can hire a hacker to recover accounts or lost passwords, change your university grades, access a phone or even get into a corporate email account. Don’t be Fooled by Good Web...
“It’s not an issue. We have Cybersecurity Insurance.” Many organizations opt to not take cyber-security beyond basic endpoint and firewall because they have a cybersecurity policy or at least have a clause in their business policy. But what happens if you must...