/Blog/

Discover 5 Major Threats to Your Digital Supply Chain and How to Reduce Your Vendor Risk

You’ve heard that vendor dependencies are ripe for malicious abuse [...]

By |2022-11-18T10:54:42-05:00November 18th, 2022|Security|Comments Off on Discover 5 Major Threats to Your Digital Supply Chain and How to Reduce Your Vendor Risk

Phishing Attacks Misuse Microsoft Dynamics 365 Customer Voice Functionality to Hide Malicious Links

Leveraging a legitimate feature of Dynamics 365, threat actors are [...]

By |2022-11-17T13:41:23-05:00November 17th, 2022|Security|Comments Off on Phishing Attacks Misuse Microsoft Dynamics 365 Customer Voice Functionality to Hide Malicious Links

[HEADS UP] FBI Warns of Tech Support Scams That Impersonate Payment Portals for Fake Refunds

In the latest FBI warning, cybercriminals are now impersonating financial [...]

By |2022-11-10T15:59:40-05:00November 10th, 2022|Security|Comments Off on [HEADS UP] FBI Warns of Tech Support Scams That Impersonate Payment Portals for Fake Refunds

[EYES OUT] This Scary Strain of Sleeper Ransomware Is Really a Data Wiper in Disguise

This Data wiper replaces every other 666 bytes of data [...]

By |2022-11-09T06:54:55-05:00November 9th, 2022|Security|Comments Off on [EYES OUT] This Scary Strain of Sleeper Ransomware Is Really a Data Wiper in Disguise