Uncategorized | May 8, 2019
Hackers are Being Bombed NowThe Israeli Defense Force (IDF) bombed a building it said housed Hamas cyberspecialists who had attempted to launch an attack that Israeli forces thwarted. The air strike is believed to […]
Uncategorized | May 8, 2019
Hackers are Being Bombed NowThe Israeli Defense Force (IDF) bombed a building it said housed Hamas cyberspecialists who had attempted to launch an attack that Israeli forces thwarted. The air strike is believed to […]
Uncategorized | May 2, 2019
How Attackers Bypass Multi-Factor Authentication (MFA)Ken May is the CEO of Swift Chip, a SoCal-based MSP with a strong focus in cybersecurity. Mr. May is also a Community Instructor for SANS, teaching their GSEC and GPEN courses. IT security tactics are […]
Uncategorized | April 9, 2019
Hackers Can Bypass 2FAThese latest attacks are designed to proxy login requests that incorporate SMS-based authentication as a way to seamlessly bypass 2FA protection without being noticed. Google researchers are seeing more phishing […]
Uncategorized | March 27, 2019
Ransomware 2.0 Is Set to Resurge as Your Insurance Now Pays Off the RansomRansomware may be poised to return as a top scourge for companies, as more and more of them pay up—it’s actually their insurance company that makes the payment—after an attack […]
Uncategorized | March 22, 2019
SHAKEN/STIR to fight robocallsAT&T and Comcast announced today that they’ve successfully tested what they believe to be the first SHAKEN/STIR-authenticated call between two different telecom networks. SHAKEN/STIR stands for Signature-based Handling of Asserted […]
Uncategorized | March 22, 2019
Triton Is the World’s Most Murderous Malware, and It’s SpreadingIn the summer of 2017, a petrochemical plant in Saudi Arabia experienced a worrisome security incident that cybersecurity experts consider to be the first-ever cyber attack carried out with “a […]