BLOG POSTS

BLOG

CISA, FBI TO US FIRMS: PREPARE FOR UKRAINE WIPERS

The CISA and the FBI issued a joint alert Saturday warning that the two “wiper” strains that attacked Ukrainian enterprises could affect US businesses. Wipers are akin to Ransomware attacks, but the goal is not to obtain money as random but to erase critical data and disrupt systems.

Read More

GAMING, BANKING TROJANS DOMINATE MOBILE MALWARE SCENE

ThreatFabric researchers recently sniffed out 300,000 banking trojan infections in Google Play during a four-month period. Overall cyberattacks against mobile users have declined drastically in 2022, but the level of sophistication of each has significantly increased. Be sure all mobile applications downloaded are legitimate and verified, especially on devices that join corporate networks.  

Read More

John Acosta of VTech Dealer IT speaks w/ Stephen Heath of Torchlight (NEW GLBA RULES FOR DEALERS)

  John Acosta CEO of VTech Dealer IT speaks with Stephen Heath CTO at Torchlight about the new FTC safeguard rules for dealers and vendors. The Federal Trade Commission (FTC) recently revised the Gramm-Leach-Bliley Act (GLBA) Safeguards Rule, in response to years of widespread data breaches and cyberattacks that have significantly harmed consumers (e.g., monetary…

Read More

John Acosta and Paul Jensen joins TimTalks (FTC GLBA Safeguard Rules for Dealerships)

CarNow’s Tim Cox is joined by John Acosta, CEO at VTech Dealer I.T., and Paul Jensen, Operations Manager at Qvale Auto Group, for an exciting and informative conversation. They discuss the new safeguards put out by the FTC, how dealerships can remain compliant with recent updates to the Gramm-Leach-Bliley Act (GLBA), and other ways to…

Read More

DDOS PROTECTION MEASURES MORE IMPORTANT THAN EVER

This past week, hundreds of DDoS attacks were carried out against a slew of nation-state targets, highlighting the necessity of DDoS protection on critical infrastructure and applications.

Read More

New Chrome 0-Day Bug Under Active Attack – Update Your Browser ASAP!

Google on Monday, February 14, 2022, rolled out fixes for eight security issues in the Chrome web browser, including a high-severity vulnerability that’s being actively exploited in real-world attacks, marking the first zero-day patched by the internet giant in 2022. Click to read the full article.

Read More

CISA Adds 15 Known Exploited Vulnerabilities to Catalog

CISA has added 15 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose a significant risk to the federal enterprise. Click to read the full article.

Read More

BotenaGo strikes again – malware source code uploaded to GitHub

Recently, BotenaGo source code was uploaded to GitHub, potentially leading to a significant rise of new malware variants. Since the release of that information, the popularity of Mirai has increased dramatically. The Mirai botnet targets mostly routers and IoT devices and supports different architectures including Linux x64, different ARM versions, MIPS, PowerPC, and more. Since…

Read More

Better preparing the workforce for cybersecurity threats

Phishing attacks are becoming an increasingly common avenue for threat actors to deploy malware and ransomware. According to one cybersecurity expert, an organization’s first line of defense against these attacks is getting all employees to realize they are high-value targets. Click to read the full article.

Read More

Striking a Balance Between Cybersecurity Awareness and Anxiety

Employees don’t have to be paralyzed by fear to keep the company safe. They just have to understand what threats look like and how to stop them. Click to read the full article.

Read More