Blog

Version 100 In Chrome And Firefox 

Version 100 In Chrome And Firefox 

nd Firefox will reach version 100 in a couple of months. This has the potential to cause breakage on sites that rely on identifying the browser version to perform business logic.  This notification covers the timeline of events, the strategies that Chrome and Firefox are taking to mitigate the impact, and how your business can stay ahead of this impending update and avoid potential business interruption. 

Conflict In Ukraine Ultimately Strengthens Cybersecurity

Conflict In Ukraine Ultimately Strengthens Cybersecurity

While it’s clear cyberattacks are playing a role in the ongoing war between Russia and Ukraine the level of disruption being inflicted by both sides is currently difficult to assess. The most overt attacks appear to have come in the form of two strains of wiper malware dubbed WhisperGate and HermeticWiper that are designed to make systems inoperable that were launched shortly before a distributed denial of service (DDoS) attack.

Cyber Insurance Won’t Save You From Ransomware

Cyber Insurance Won’t Save You From Ransomware

Many businesses have some form of cyber insurance as a precaution in case of a data breach or other cyberattack. In some cases, ransomware attacks are also covered by that insurance. If you have ransomware coverage, you might think that your ransomware woes are behind you. After all, isn’t that the point of having insurance?

Data Breaches Reached Another All-Time High In 2021

Data Breaches Reached Another All-Time High In 2021

There’s no doubt that 2021 will be one of the record books regarding data breaches. The Identity Theft Resource Center (ITRC) reported the total number of data breaches through September 30, 2021, had already exceeded by 17% the total number of events in 2020. The numbers can only go up due to recent zero-day vulnerabilities such as Log4j.

Attack and Threat Update – Critical Vulnerability

Attack and Threat Update – Critical Vulnerability

Log4j is a Java-based logging audit framework within Apache. Apache Log4j <=2.14.1 JNDI features used in the configuration, log messages, and parameters do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

Threat Spotlight: COVID-19 test-related email scams

Threat Spotlight: COVID-19 test-related email scams

COVID-19 has dominated headlines for almost two years, and hackers continue to exploit the pandemic in their attacks. In March 2020, COVID-19-related phishing attacks jumped 667%, and then as vaccination programs rolled out, so did the new wave of vaccine-related email threats. The latest omicron variant led to another spike in COVID-19 cases and phishing attacks.

Call Now Button