Category: Uncategorized

Breach of the Week: Shopper Approved

The Breach Shopper Approved is the latest Magecart victim.  A malicious JavaScript compromised the code of the popular plugin that online retailers can embed their sites to allow customers to post opinions and ratings. A payment card skimmer code had been added to a legitimate file that collected information entered in checkout forms. Compared to…

Read More

Breach of the Week: Apollo

What Happened: Apollo Apollo is a sales engagement startup that helps salespeople connect with prospective customers.  This startup is the latest company who failed to properly protect their data. As a result, attackers were able to access the company contact database that is used to match sellers with potential buyers.  The prospect database contains 200…

Read More

AI and Cybersecurity: The Battle Between Good and Evil

From Siri and Watson to self-driving cars – artificial intelligence (AI) is becoming part of our everyday life. Machine learning, one type of AI, allows the automation of processes and human-like decision making. The substitute of human effort for AI has certainly found its place in cybersecurity.   The Good AI is being applied in…

Read More

Breach of the Week: Veeam Exposed Customer Records (INFOGRAPHIC)

What happened: Veeam, a Swiss-based data company exposed more than 445 million records after using a misconfigured host on Amazon Web Services.  The issue was that it did not require any password to access. An independent security researcher, Bob Diachenko, discovered the open database on September 5. Diachenko notified Veeam about the issue but received no response. …

Read More

Hurricane Florence: Tips to Prepare Your Business

Today’s blog is brought to you by our partner Datto.   Republished from Datto’s Blog Originally published on September 10, 2018 By Chris Brunau Hurricane Florence is expected to make landfall as a Category 4 storm. Florence is capable of catastrophic damage with maximum sustained winds of 130 miles per hour. The storm is expected to make landfall…

Read More

Breach of the Week: MEGA Extension Hack (INFOGRAPHIC)

What Happened: On September 4, an unknown hacker uploaded a malicious version of a MEGA Chrome extension. The MEGA.nz extension is a cloud storage service. The attacker was able to hack into MEGA’s Google Chrome web store account and upload the malicious version. The malicious version allowed the hacker to steal users’ credentials for popular websites…

Read More

Raising the Bar on Cybersecurity: 10 New CounterACT® Features and Capabilities

Today’s blog is brought to you by our partner ForeScout.     Republished from ForeScout’s Blog Originally published on August 31, 2017 By Jennifer Geisler Vice President, Marketing Twitter: @GoGeisler   With the rapid influx and diversity of devices connecting to enterprise networks and the ever-evolving cybersecurity threat landscape, organizations are struggling to keep their physical…

Read More