Category Archives: Threat Intelligence

Global Cyber War: What is at stake?

The Russian military invasion of Ukraine has begun with missiles striking just outside the capital, Kyiv, in the early morning hours on February 24th. While this event marks the beginning of military involvement in the campaign against Ukraine, Russian-sponsored hackers have been bombarding Ukrainian websites and infrastructure for the past few weeks in preparation for […]
Read More »

Log4J: The Minecraft found, Java fueled nightmare.

On December 9th, the greater information security community had its world turned upside down when a newly uncovered zero-day vulnerability was found in Apache’s Java logging library Log4J. Within hours of this news, every major software company was in disaster mode, attempting to determine how their products were affected and how to fix a patch […]
Read More »

Colonial Pipeline Ransomware Attack: What happened and how we move forward.

Americans on the East Coast have found themselves on the wrong end of one of the most impactful ransomware attacks this country has ever seen. The FBI reported earlier this week that a group known as DarkSide has claimed responsibility for an attack that caused the shutdown of the Colonial Pipeline. On Friday, May 7th, Colonial announced that they had halted […]
Read More »

CyberSecure Solutions Security Bulletin (September 4, 2019)

Overview Phish Tale of the Week Google Discovers Mass iPhone Hacking Hacking Group Targets WordPress Vulnerabilities How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing is a type of online scam where criminals send an email that appears to be from a legitimate source such as a company or a doctor’s office and […]
Read More »

CyberSecure Solutions Security Bulletin (August 21, 2019)

Overview Phish Tale of the Week 23 Towns Across Texas Hit by Ransomware Attack European Central Bank Suffers Data Breach How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week Phishing attempts are often carried out with the purpose of tricking the target into downloading or accidentally running a malicious script on their devices. This example […]
Read More »

CyberSecure Solutions Security Bulletin (August 7, 2019)

Overview Phish Tale of the Week Cyber Attacks on the Rise US Utilities Have Become Targets How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week For this week’s Phish Tale of the Week, we’re taking a look at the phishing email that was sent to our HQ office that claims to be a promotional […]
Read More »

CyberSecure Solutions Security Bulletin (July 24, 2019)

Overview Phish Tale of the Week Sprint Breach Exposes Customer Data Critical Flaw Found In VLC Media Player How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week As is typical for most businesses, our HQ Office inbox receives the occasional phishing email attempting to trick an employee into sending the perpetrator some sort of […]
Read More »

Netizen Cybersecurity Bulletin (July 10, 2019)

Overview Phish Tale of the Week Microsoft’s BlueKeep Proves Vulnerable Critical Warning Issued for Samsung Cellphone Update App How Can Netizen Help? Phish Tale of the Week Phishing attempts are often carried out with urgent messages that are meant to provoke the victim to act without rationally thinking about the contents of the email. In […]
Read More »

Netizen Cybersecurity Bulletin (June 26, 2019)

Overview Phish Tale of the Week Vulnerability in TP-Link’s Wi-Fi Extenders Could Allow Remote Control to Attackers Latest Phishing Scam Impersonates Apple Support How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing email targeting […]
Read More »

Netizen Cybersecurity Bulletin (12 June 2019)

Overview Phish Tale of the Week Microsoft Urges Users to Patch BlueKeep Security Flaw U.S. Customs and Border Protection Data Breach How Can Netizen Help? Phish Tale of the Week Malicious actors are constantly finding new ways to target a big payday. In the newest trend, these cyber criminals are using secured websites to run […]
Read More »