by Miguel Morales | Nov 7, 2020 | IT Support
Welcome to the Employee Cybersecurity Training Handbook. You will need it more than ever, considering most breaches are mainly caused by inner issues. 64% of insider threats are caused by careless behavior or human error. However, the insider threat does not mean that...
by Miguel Morales | Nov 6, 2020 | IT Support
Has a technician likely accessed your machine from a remote location?This is a hacker’s dream and can be done using Remote Access Trojan (RAT). They can take control of the PC using software created for this specific function. From downloading software,...
by Miguel Morales | Nov 5, 2020 | IT Support
Almost every penetration test starts with the finding of a low-hanging fruit powered by phishing techniques. This one (Evilginx) is capable of bypassing Google’s high-guarded security walls, but it doesn’t limit to work for other defenses. How does Evilginx...
by Miguel Morales | Nov 5, 2020 | IT Support
Google Project Zero is the elite group of white hat hackers reporting exploits. This time, they reported a zero-day vulnerability. Remember when we talked about Google’s Bug Bounty program? These (Project Zero) isn’t formed by rookies. Google’s Project...
by Miguel Morales | Nov 4, 2020 | IT Support
Shamoon, Black Energy, Destover, ExPetr/Not Petya, and Olympic Destroyer: All of these Wiper malware, and others like them, have a singular purpose of destroying systems and / or data, usually causing great financial and reputational damage to the victim companies. ...