Security

Open Source Hero: Dodging a Malicious Bullet

Have you ever heard of XZ Utils? It's a handy tool for data compression in Linux systems that's widely used but not well-known outside the world of open-source software. However, last week, security experts uncovered a serious flaw in XZ Utils that could leave networked Linux computers open to malicious attacks. This vulnerability is no [...]

2024-04-04T12:13:44-05:00Cybersecurity, Security|0 Comments

Protecting Router Security

Combatting the Volt Typhoon Campaign: Proactive Steps for Router Security In light of recent cyber incidents, a comprehensive guide has been issued by the Cybersecurity And Infrastructure Security Agency (CISA) and the FBI to help owners of vulnerable routers bolster their protection. This advice is critically pertinent for home office workers and small to medium-sized [...]

2024-02-13T16:23:25-05:00Cybersecurity, Security|0 Comments

How Hackers Are Shaping the Russia-Ukraine War – Karmic Prospective

The ongoing conflict between Russia and Ukraine has been marked by a series of cyberattacks that have targeted both sides of the border. From disrupting government websites and radio stations to sabotaging food supply chains and critical infrastructure, hackers have been playing a significant role in the war, both as allies and enemies of the [...]

FBI Deletes Hundreds of Criminally Installed Shells

Remote-control malware wiped from Microsoft Exchange Servers by FBI The FBI deleted web shells installed by criminals on hundreds of Microsoft Exchange servers across the United States, it was revealed on April 13, 2021. The Feds were given approval by the courts to carry out the deletions, which occurred without first warning the servers' owners, [...]

Rethinking Apple Security

Malware monsters target Apple's M1 chip with 'Silver Sparrow' US security consultancy Red Canary says it has found MacOS malware written specifically for the shiny new M1 chip that Apple created to power its post-Intel Macs. Red Canary has named the malware "Silver Sparrow" and says it had found its way onto almost 30,000 MacOS [...]

Organizations Infected Sunburst Malware in the Aftermath of the SolarWinds Supply Chain Attack

Multiple security researchers and research teams have published over the weekend lists ranging from 100 to 280 organizations that installed a trojanized version of the SolarWinds Orion platform and had their internal systems infected with the Sunburst malware. The list includes the names of tech companies, local governments, universities, hospitals, banks, and telecom providers. The [...]

FireEye, Top Cybersecurity Firm, Hacked by Russian GRU

For years, the cybersecurity firm FireEye has been the first call for government agencies and companies around the world who have been hacked by the most sophisticated attackers, or fear they might be. Now it looks like the hackers — in this case, evidence points to Russia’s intelligence agencies — may be exacting their revenge. [...]

Homeland Security Warns U.S. Businesses About Risks of Exposure to China Tech

The United States Department of Homeland Security (DHS) has published a guide to the terrifying risks that businesses will expose themselves to if they use tech created in the Peoples’ Republic of China (PRC) or engage in any business activity with the Middle Kingdom. The fifteen-page “Data Security Business Advisory” [PDF] opens by warning “Businesses [...]

Bad Neighbors – Pitfalls of Cheap Hosts

What is a Bad Neighbor and why should you be concerned? Bad Neighbor is actually a vague term referring to many situations, mostly with reference to shared web hosting. However, the term can also refer to a link to a “less than honorable” website. We are referencing the bad neighbors related to e-commerce websites hosted [...]

Son of a Breach! Can Companies Just Safeguard Their Customers’ Data?

Just when consumers were starting to regain some company trust and safe-shopping stability after last year’s massive Target breach, a string of new large-scale company breaches quickly reminded us consumers just how insecure our personal data can be. Needless to say, it’s been a rough year for some major companies and an even rougher year [...]

Go to Top