(954) 237-7797
Let's Talk
Blog
April 20, 2022 by Vertical Axion
Do you have an Android device? Even if you don’t, you know someone who does. Google is incredibly good at spotting poisoned copies of apps on its Play Store and getting rid of them before they can spread to the devices of users who rely on the safety and security offered by the Play Store. […]
Read more »
Tagged
April 12, 2022 by Vertical Axion
Diana Lopera is a researcher for Trustwave Cybersecurity and has stumbled across something that’s one part interesting and one part disturbing. Apparently, a group of hackers are trying a new approach to distribute their malicious code which is leveraging Microsoft’s HTML help files. Yes, you read that correctly. It’s an innovative technique that’s not only […]
April 9, 2022 by Vertical Axion
If you follow the global threat landscape closely, then you may already be aware of a notorious Chinese hacking collective known as “Storm Cloud.” What few people know is that this group seems to be the driving force behind a new variant of malware that researchers have recently spotted in the wild. Dubbed “GIMMICK” by the […]
April 6, 2022 by Vertical Axion
People who are in the habit of pirating movies and software have something new to worry about. It seems hackers have begun targeting at least some of them with a ubiquitous form of malware. On the Dark Web, anyone who is willing to shell out twenty bucks or so can get their hands on a […]
April 5, 2022 by Vertical Axion
A security researcher who goes by the name “Dr. Web” has been tracking a suspicious increase in Trojan infiltration emanating from the Google Play Store. It is not currently known whether a single organized and determined group of hackers is responsible for the surge or if several groups just happen to be focused on the […]
April 2, 2022 by Vertical Axion
Do you rely on Microsoft SQL and MySQL databases? If so, be advised that the cybersecurity firm AhnLab recently published a report about a newly emerging threat. It seems that hackers are now targeting poorly secured Microsoft SQL and MySQLdatabases with a malware strain known as GhostCringe. If you’re not familiar with it, GhostCringe is […]
March 28, 2022 by Vertical Axion
Hackers have been using social engineering tricks to get their malicious code onto the systems of unsuspecting victims. This has been happening for almost as long as the internet has been around. It’s one of the most common tactics in use today, primarily because it’s so simple and effective. Trial and error have shown hackers […]
March 23, 2022 by Vertical Axion
Here’s a statistic you’re not going to like. Based on research conducted by cybersecurity researchers at Proofpoint, there has been a staggering 500 percent increase in malware attacks against mobile devices during the opening months of 2022. The most significant peak so far this year occurred at the end of February. Most of the malware […]
March 15, 2022 by Vertical Axion
If you have smart devices in the Android ecosystem, there’s a new threat to be aware of in the form of a malware strain called Teabot. This bit of malicious code is a Remote Access Trojan or RAT for short. The group behind the code is making a big push to see it spread worldwide. […]
March 11, 2022 by Vertical Axion
Security experts tell people all the time to never to download apps from anywhere other than official sources like the Microsoft Store, the Google Play Store, and the Apple App Store. It’s good advice but unfortunately, even those sources aren’t perfect when it comes to keeping malicious apps that have been poisoned with malware off […]
March 4, 2022 by Vertical Axion
Do you have a WordPress site? Do you use the PHP Everywhere plugin? If so, you’re not alone. More than 30,000 site owners have installed it. It’s an excellent plugin that dramatically enhances websites using it, because it allows webmasters to place PHP pretty much anywhere on the page to display dynamic web content. Wordfence […]
March 1, 2022 by Vertical Axion
There are two new forms of malware spreading rapidly among people with Android devices according to researchers at ThreatFabric. This latest campaign involves the FluBot malware (also known as Cabassous) and the Android banking trojan called Medusa. What’s disturbing about this most recent spate of attacks is that both forms of malware share the same […]
February 28, 2022 by Vertical Axion
According to researchers at HP, there’s a new threat to worry about. Hackers have recently begun disguising malware as Windows 11 upgrades and are using them to target Windows 10 users who are anxious to move to Microsoft’s latest OS. This new campaign begins like many others with an email informing the recipient that if […]
February 24, 2022 by Vertical Axion
Researchers from Fortinet are warning of a new threat to be on the lookout for. Right now, NFTs are all the rage. Everyone is talking about them, and many are excited about them. Hackers have been quick to take advantage of that fact, and the Fortinet researchers have stumbled across a poisoned spreadsheet that purports […]
February 23, 2022 by Vertical Axion
Researchers at Avanan are a Check Point subsidiary. They have recently issued a warning that anyone who uses Microsoft Teams should be aware of. According to the latest statistics, more than 270 million people use Teams every single month. According to Avanan, hackers are breaking into Team chats and attaching malicious files to ongoing conversations. […]
February 22, 2022 by Vertical Axion
For most of the history of the internet Linux has been able to stay below the radar of hackers around the world. While there have been some attacks that specifically targeted Linux users, they’ve managed to keep a low enough profile that it hasn’t been a major issue. According to a group of researchers from […]
February 21, 2022 by Vertical Axion
Researchers have spotted a new phishing campaign you should be aware of. What sets this one apart is that the hackers are using a lowly but specially crafted CSV file to infect machines. They are installing the BazarBackdoor malware. If you’re not familiar with the term CSV stands for “Comma Separated Values” and it’s a […]
February 16, 2022 by Vertical Axion
In late 2020 a new strain of malware called UpdateAgent appeared and began infecting Mac users. Initially the strain wasn’t all that worrisome. It stole system information but it was by no means the worst threat on a Mac user’s radar. Since that time, the hackers behind the malicious code have been busy. UpdateAgent has […]
February 14, 2022 by Vertical Axion
BRATA malware was first spotted in the wilds by Kaspersky back in 2019. Its earliest incarnation saw it targeting e-banking users and it was designed to steal banking and login credentials of anyone infected. That’s undeniably bad but according to researchers the latest version of BRATA has gotten downright nasty. Security professionals have discovered a […]
February 9, 2022 by Vertical Axion
There’s good news for Apple users. The company has been busy and has recently released security updates that address two Zero-Day vulnerabilities. These are security flaws that could be exploited by hackers to cause no end of trouble to anybody running macOS or iOS. The first Zero-Day addressed is being tracked as CVE-2022-22587 and is […]
February 5, 2022 by Vertical Axion
Cisco recently discovered a critical security flaw in their Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS. The vulnerability allowed an attacker to execute code arbitrarily and gain root-level access on any device suffering from the vulnerability which is being tracked as CVE-2022-20649. The good news is that Cisco responded with blistering speed and this […]
January 31, 2022 by Vertical Axion
There’s a new strain of malware called SysJoker to be mindful of. It’s especially dangerous because it can target Windows, Mac or Linux systems. That makes it an equal opportunity strain. Researchers at Intezer are credited with discovering the malware in the wild in December of 2021 during an investigation of an attack on a […]
January 22, 2022 by Vertical Axion
A research team from Minerva Labs are working in conjunction with the MalwareHunterTeam. They have recently been tracking a Trojan called Purple Fox and have published a warning about it. The group behind the Trojan is now distributing their malicious code disguised as a Telegram installation file. If you’re not familiar with that name Telegram […]
January 21, 2022 by Vertical Axion
By now you’re almost certainly aware of the Log4j Java issue. It’s a serious and fixable flaw relating to java logging. Recently the United States Federal Trade Commission (FTC) has issued a chilling warning to anyone who hasn’t yet fixed the flaw and protected against the vulnerability. The FTC’s statement reads in part as follows: […]