Netizen Blog and News
The Netizen team sharing expertise, insights and useful information in cybersecurity, compliance, and software assurance.
Category: CyberSecurity
-

On March 2nd 2021, tech giant Microsoft announced that they had uncovered major vulnerabilities in their popular mail server Microsoft Exchange. In a later statement, Microsoft announced that a Chinese-backed group known as Hafnium had begun exploiting these vulnerabilities which lead to an immediate response from Microsoft to warn all Exchange users. Shortly after this…
-

Overview Phish Tale of the Week U.S issues warning after Microsoft says China hacked its mail server program Ransomware as a service is the new big problem for business How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance,…
-

Earlier this month, a Florida wastewater treatment plant’s computer system was compromised by an unknown threat actor. This hacker was able to remotely gain access via an employee’s login credentials and attempted to alter the chemical composition of the public water supply to dangerous levels. Thankfully, a plant operator was watching this all unfold and…
-

Overview Phish Tale of the Week New cybersecurity hirings in the new administration. Looking for cybersecurity experts? Consider hiring veterans. How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting business/work emails offering…
-

On December 13, 2020 cybersecurity company FireEye announced they had discovered a state-of-the-art exploit that created a backdoor in SolarWind’s Orion application. This hack was then distributed to thousands of systems running this application as a routine update from the manufacturer. With no reason to suspect any issues, IT administrators all over the country unknowingly…
-

Although DFARS CUI compliance and CMMC programs do overlap, the assessment (audit) process will be significantly different moving forward
-

Routine vulnerability assessments evaluate what risks and threats exist for your business systems, assign severity levels to them, and ultimately recommend modifications or countermeasures to minimize the risk of a breach.
-

Remote work is here to stay and, as the most recent COVID-19 pandemic declaration is beginning to demonstrate, it can be a highly effective disaster mitigation and recovery strategy when implemented properly. However, too many companies and other organizations have been caught unprepared technologically, and attackers have been waiting for just such an opportunity to…
-
Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help? Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and…
-
Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help? Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example…