Posts tagged "#InfoSec"

Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds

October 7th, 2024 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Smart Guessing Algorithm Cracks 87 Million Passwords In Under 60 Seconds”

“An advanced algorithm has shattered 87 million passwords in under a minute, revealing a chilling vulnerability in the way we protect our most sensitive data.”

Glenn Baruck, The eDot Family of Companies

In a stunning demonstration of how quickly cybercriminals can exploit weak security, a new smart-guessing algorithm has cracked 87 million passwords in under 60 seconds. This breakthrough highlights the increasing sophistication of password-cracking techniques and raises serious concerns about the adequacy of traditional password protection. As companies and individuals rely on passwords to safeguard sensitive information, this development underscores the urgent need for stronger authentication methods. Explore how this powerful algorithm works and what steps you can take to protect your data in this evolving landscape.

Read More

Manufacturing is the most targeted sector by cyber criminals

September 16th, 2024 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Manufacturing is the most targeted sector by cyber criminals”

“Cyberattacks are on the rise; the manufacturing sector now faces an unprecedented wave of threats, making it the most targeted industry by cybercriminals!”

Glenn Baruck, eDot

The manufacturing sector has become the leading target for cybercriminals, surpassing industries that have historically faced the brunt of cyberattacks. As manufacturing and construction technology advances and automation increases, manufacturing companies are more vulnerable than ever. This shift highlights the critical need for vigorous cybersecurity measures to protect sensitive data and operational systems. In this post, Jordyn Alger, Managing Editor for securitymagazine.com, explores the factors behind this growing trend and discusses strategies for strengthening defenses in these at-risk environments.

Read More

The role of remote tools on email security attack strategies

September 9th, 2024 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “The role of remote tools on email security attack strategies”

“Business owners, don’t miss this must-read guide to fortifying your email security—learn how to stay one step ahead of cybercriminals using remote tools to target your business!”

Glenn Baruck, eDot

Remote tools have become indispensable in today’s business operations, however, they also introduce new cybersecurity challenges. As cybercriminals evolve their tactics, email security remains a primary target for attacks. This recent article by Riaz Lakhani for securityinfowatch.com article investigates how attackers leverage remote tools to exploit vulnerabilities in email systems. Understanding these strategies is crucial for organizations looking to bolster their defenses and safeguard sensitive information.

Read More

CrowdStrike fallout continues: Beware of these scams linked to the blue screen outage

August 5th, 2024 Posted by Life and Culture, Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “CrowdStrike fallout continues: Beware of these scams linked to the blue screen outage”

“Stay focused; the fallout will continue for a while! ”

Glenn Baruck, The eDot Family of Families

Stay on your toes if you want to protect yourself and your business in our evolving cybersecurity landscape! As author Emily Price for Fastcompany.com explains, a recent McAfee report shows that vigilance is more critical than ever as it sheds light on the latest scams and hacks that have surfaced in the wake of a significant CrowdStrike outage. As cybercriminals exploit these vulnerabilities, understanding these threats is essential for safeguarding your digital assets.

Read More

CrowdStrike-Microsoft Outage: 5 Key Updates To Know

July 22nd, 2024 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “CrowdStrike-Microsoft Outage: 5 Key Updates To Know”

“What to know about the massive outage that continues to cause problems! “

Glenn Baruck, The eDot Family of Families

When it comes to cybersecurity, staying updated on significant incidents is crucial. Recently, CrowdStrike provided insights into the major Microsoft outage, revealing critical developments that every organization should know. These updates are essential for maintaining robust security defenses, from potential vulnerabilities to the latest mitigation strategies. This blog post delves into the five key updates from CrowdStrike’s analysis, highlighting their implications for your security posture and future readiness.

Bonus:  Microsoft recovery tool information (link to a second piece by Mark Haranas)

Read More

Tricky Fake Invoice Phishing Attack Uses Search to Deliver Malware

July 15th, 2024 Posted by Security & Surveillance, Small and Medium-Sized Businesses (SMBs), Technology 0 thoughts on “Tricky Fake Invoice Phishing Attack Uses Search to Deliver Malware”

“Heads Up! Think twice before clicking on that “invoice in your inbox! “

Glenn Baruck, Chicago Voice & Data

The latest phishing campaign, uncovered by security researchers, demonstrates a cunning abuse of Windows Search to distribute malicious software. “Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware,” the researchers state.

This exploitation highlights the urgent need for vigilance and robust cybersecurity measures. In this blog post by Stu Sjouwerman for KnowB4.com, Sjouwerman uncovers the mechanics of this alarming scheme and offers practical advice on protecting yourself and your organization from such threats.

As a KnowB4 partner, we can help you educate your team and keep you prepared and informed. Act now to learn how to identify and stop ransomware attacks before they wreak havoc on your network in this Ransomware Master Class from our Partner @KnowBe4.

Read More

Archives