Category Archives: Security

Netizen Cybersecurity Bulletin (April 13th, 2021)

Overview Phish Tale of the Week 533 Million Facebook Users’ Personal Identifiable Information Leaked Online Fleecware Apps Accumulate $400M in Revenue How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting unsuspecting JPMorgan […]
Read More »

Microsoft Exchange Hack: What happened and what we learned.

On March 2nd 2021, tech giant Microsoft announced that they had uncovered major vulnerabilities in their popular mail server Microsoft Exchange. In a later statement, Microsoft announced that a Chinese-backed group known as Hafnium had begun exploiting these vulnerabilities which lead to an immediate response from Microsoft to warn all Exchange users. Shortly after this […]
Read More »

Netizen Cybersecurity Bulletin (March 12th, 2021)

Overview Phish Tale of the Week U.S issues warning after Microsoft says China hacked its mail server program Ransomware as a service is the new big problem for business How can Netizen help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, […]
Read More »

Oldsmar Water Treatment Facility Breach: What happened and what we learned.

Earlier this month, a Florida wastewater treatment plant’s computer system was compromised by an unknown threat actor. This hacker was able to remotely gain access via an employee’s login credentials and attempted to alter the chemical composition of the public water supply to dangerous levels. Thankfully, a plant operator was watching this all unfold and […]
Read More »

Netizen Cybersecurity Bulletin (February 1st, 2020)

Overview Phish Tale of the Week New cybersecurity hirings in the new administration. Looking for cybersecurity experts? Consider hiring veterans. How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting business/work emails offering […]
Read More »

SolarWinds Breach Fallout: What happened and what we learned

On December 13, 2020 cybersecurity company FireEye announced they had discovered a state-of-the-art exploit that created a backdoor in SolarWind’s Orion application. This hack was then distributed to thousands of systems running this application as a routine update from the manufacturer. With no reason to suspect any issues, IT administrators all over the country unknowingly […]
Read More »

Netizen Cybersecurity Bulletin (December 15, 2020)

Overview Phish Tale of the Week IoT Cybersecurity Improvement ACT Passed Universities Across The Globe Attacked by Phishing Scam How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing scam targeting unsuspecting Amazon customers. This […]
Read More »

Prepare Your Company For CMMC

The Cybersecurity Maturity Model Certification (CMMC) was created by the Department of Defense (DoD) in order to put a cybersecurity assessment model and certification program in place.

CyberSecure Solutions Security Bulletin (September 4, 2019)

Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and […]
Read More »

CyberSecure Solutions Security Bulletin (August 21, 2019)

Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example […]
Read More »