top of page


Cybercriminals Using Google Calendar Invites in latest Phishing Scam
Cybercriminals are exploiting a new tactic in their phishing campaigns by leveraging Google Calendar invites to deceive unsuspecting...
Greg Meyers
Jun 82 min read
7
0


Android Users Vulnerable To Crocodilus Phishing Attacks
What is Crocodilus Malware? Crocodilus is a new strain of Android malware is targeting users by creating fake contacts on infected...
Greg Meyers
Jun 52 min read
5
0


How AI is Revolutionizing Phishing Scams
Artificial Intelligence (AI) is revolutionizing phishing scams, making them more convincing, scalable, and harder to detect. In fact,...
Greg Meyers
May 282 min read
4
0


North Korea is Funding their Weapons Program by Posing as Remote IT Freelancers
This is a real and growing concern that has been reported by both U.S. intelligence agencies and cybersecurity firms. North Korean...
Greg Meyers
May 122 min read
5
0


Beware of New Sophisticated Google Gmail Phishing Scheme
Beware of New Sophisticated Google Gmail Phishing Scheme
Greg Meyers
Apr 192 min read
11
0


CRM Platforms and Bulk Email Providers on High Alert for new Phishing Threat
A sophisticated and very dangerous phishing campaign entitled PoisonSeed has recently emerged, targeting Customer Relationship...
Greg Meyers
Apr 72 min read
10
0


Huge Legal Problem for Google resurfaces with GootLoader in Google Ads
Gootloader Malvertising This can be summed up in one clever word: Malvertising. Just imagine the liability Google faces when anyone does...
Greg Meyers
Apr 42 min read
6
0


Stay Away from Malicious Document Converters
The FBI is warning everyone to be vigilant about Threat Actors attempting to distribute Malware and Ransom through free Document...
Greg Meyers
Mar 211 min read
3
0


North Korea's Lazarus Group Responsible for the Largest Cryptocurrency Theft in History
It's absolutely astonishing that this is not getting more media attention. North Korean state-sponsored hackers, specifically the Lazarus...
Greg Meyers
Mar 42 min read
3
0


Amazon Web Services Introduces AWS Security Incident Response
Wow, this sounds like a significant step forward for businesses looking to enhance their cybersecurity resilience. AWS Security Incident...
Greg Meyers
Feb 282 min read
4
0


Cybersecurity-Focused HIPAA changes are coming to the Healthcare Industry
Stricter rules for safeguarding electronic health records (EHRs) are crucial, especially given the increasing threats to cybersecurity
Greg Meyers
Jan 303 min read
8
0


Microsoft's January 2025 Security Update: Summary of Exploited Zero-Day Flaws and Urgency of Applying Security Updates
In January 2025, Microsoft released a significant security update addressing 161 vulnerabilities across various products. Among these...
Daniel Arenas
Jan 233 min read
4
0


Why 2025 Cyberattacks and Data Breaches are a "Hot Spot" for the Healthcare Industry
Cyberattacks on healthcare systems cost billions of dollars. Proactive cybersecurity measures are essential to protect lives and data.
Greg Meyers
Dec 4, 20245 min read
7
0


Insider Threat Detection in Tech Startups: A CEO's Guide to Cybersecurity Strategies and Prevention
Startups are vulnerable to insider threats. Learn how to protect your start-up.
Daniel Arenas
Nov 6, 20244 min read
23
0
Cybersecurity Blog
bottom of page