Welcome to

Our Blog

Cyber security.jpg
Russia Acid Rain.jpg

Russia began its war on Ukraine with a series of wiper malware attacks. Wiper attacks simply want to make a device inoperable by destroying its boot sector. It’s basically an offensive cyber weapon which can access points into the company network. All of these network endpoints could be exploited to do serious damage, which is why high quality endpoint protection is so important. To say the very least, this doesn’t look good and could give a signal to any malicious entity that Viasat is easy to hack.

Russian hacking Ukraine.jpg

February 24, 2022

“IN ACCORDANCE WITH THE DECISION OF THE EMERGENCY MEETING OF THE SECURITY COUNCIL OF UKRAINE DATED 24.02.2022” - The headline of a spear phishing campaign. The emails had a malicious attachment, “list of persons.xlsx”. This seemed to hint at names on a ‘kill list’ that was reportedly issued by the Russian government. It appears the sender accounts were legitimate but compromised. Here is the notice about this from the Ukrainian government.


December 6, 2021

These attacks use a company’s own contact form, available on their company website, to generate fake emails with malicious links and is being used by ransomware gangs to tunnel into a corporate network and encrypt company data until they pay a ransom. The IBM cybersecurity team (IBM X-Force) has associated the latest contact form attacks with the notorious Trickbot gang and Conti/Ryuk ransomware.


August 9, 2021

It appears that members of either DarkSide, REvil, or both have emerged as a new ransomware group calling itself, BlackMatter. They will not attack infrastructure or any components of the oil and gas industry.


So, if your company is a private company, you have just had a target put on your back, the door is open and more companies are now in jeopardy.  


June 1, 2020

If you are a vice president or managing director and are working in either banking or IT, be very wary of any emails with any attachments, especially those that lead to a site with a reCAPTHA. If you finally make it to a login page, look closely at the URL, especially, the extension. This is a well-designed attack that is destined to produce a lot of victims. Try not  to be one of them.


June 1, 2020

A few of the more well-known apps Alien  can take control of:  
Microsoft Outlook, Bank of America Mobile Banking, Capital One Mobile, Wells Fargo Mobile, Google Play, Facebook, WhatsApp Messenger, Snapchat, Twitter, Instagram, and Skype.


COVID-19 + Excel Attachment = Lost Data

June 1, 2020

Be aware of any email that evades your spam filter and seems to come from Johns Hopkins or W.H.O. (World Health Organization) with a tie to COVID-19 in the subject line. . . it's a phishing attack using an Excel attachment.

Russian Hacking (002).jpg

Russian Gang Making Millions Hacking Cities and Counties across America

May 6 2019

Once upon a time, North Korea only cared about cyber espionage. Most of the time, they wanted to spy on South Korea or disrupt South Korean operations. Then, a terrible thing happened.


April 8, 2019

Bad apps keep getting through; according to Google, less than 1%. Nonetheless, 1% of 1 billion is still 10 million… just saying.  Notice that apps containing Trojans lead the way, and that’s not good. These apps release malware that can quickly gain control of your device. These are often RATs (Remote Access Trojans) which enable hackers to control your device remotely.


March 18, 2019

If the Citrix hack really did come from the Iranian government, we should expect some attacks on key U.S. government agencies in the future. Stay tuned. This could be an interesting year in cybersecurity.


Hackers Find a New Way to Get Control of Your Bank Account

March 11, 2019

Nothing can make a hacker happier than gaining control of a bank account, and they will do whatever they can to do so. .


When Algorithms Go Bad

March 11, 2019

Algorithms could be manipulated to have weapons misfire or fire on the wrong target . . . A database, itself, could be infected to make algorithms reach dangerous conclusions


It’s Hacking Season in Tibet

February 25, 2019

The scenario outlined above highlights the sensitivity of algorithms to manipulation by nefarious agents. Algorithms could be manipulated to have weapons misfire or fire on the wrong target,

cyber attack.png

5 Surprising and mostly Unknown Cyber Security Facts

February 18, 2019

At the time of this writing, SpeakUp is being used to install cryptomining software, however, few researchers believe this is its ultimate goal, as it has the sophisticated architecture to launch a far more devastating worldwide attack.


February 11, 2019

Clicking on one of the options shown above will take you to these fake survey sites or to sites offering free gift cards to well known stores. All you have to do is give them some personal information.

Read More

“Love You” Phishing Emails Arrive in Time for Valentine’s Day

February 4, 2019

The point is to get you interested in the subject line, abandon normal caution, and open the inviting attachment. Sadly, you will find no love there.


The Business Process Compromise: The Cyber Attack You Don’t See Coming

January 28, 2019

Most companies and organizations simply can’t compete with the hackers behind these attacks. If a breach actually occurs, the F.B.I. suggests you work with them.  

rise in malware.png

Cyber Insurance Firms Fund Malware Development

January 21, 2019

Billions are being made by these extortionists because ransomware is the easiest way for hackers to get a quick payoff. If cyber insurance companies guarantee ransom payments, they, in effect, guarantee an income for novice hackers around the globe.