Beware: if you’re infected by the QBot Trojan, it’s possible to have your email threads (the chain of back and forth emails in any given email conversation) stolen and used to make an attack look more authentic. How? Let’s break it down in our latest cybersecurity blog.
Electronic recycling should be on everyone’s radar, but in case you’re behind the curve, this blog is especially for you! We believe strongly in the power of doing our individual and corporate part to recycle electronics and are happy to provide resources for how your business can be doing the same.
A $1,040,000 fine for a fairly small provider. That’s the number we’ll be talking about in this blog. Ready to keep reading?
In the latest newsworthy breaches, Lifespan Health System Affiliated Covered Entity (Lifespan ACE) recently agreed to a large settlement over HIPAA violations.
Where are we in the world of cybersecurity? It’s easy to miss the cybersecurity threats and attacks happening right in our “backyard”. Our goal at PK Tech is to educate and offer proactive steps for cybersecurity safety. It’s important to be aware--without being afraid--of the cybersecurity threats that are real threats for your business.
In this blog, we’ll be highlighting an emerging threat known as lateral phishing.
While account takeover has been one of the most common and fastest growing email security threats in recent years, researchers have uncovered a new type of account takeover attack they’ve coined, “lateral phishing”.
What is lateral phishing?
Using hijacked accounts they’ve recently compromised successfully, attackers send out phishing emails to a variety of recipients.
Is Your Company Characterized by Weak Security? Here’s a List of the Largest Breach Fines, Penalties and Settlements in Recent Years
Weak security is a multifaceted problem for many companies: not only does it mean poor cybersecurity for sensitive data, it also means the potential for large nominal fees. The companies mentioned in this blog have paid almost $1.63 billion (and counting), for hacks and data thefts.
We’ve all heard the term Artificial Intelligence (AI) and in many ways it refers to futuristic possibilities: innovation and an exciting future of artificial intelligence. But what about the flip side of AI? While there are many, let’s take a glance into the possible risks of AI to cybersecurity in years to come.
Watchguard recently released its latest report for Q1 2020, providing analytics from 44,000 global appliances. In general, upwards of two-thirds of the total malware detected was hidden in the HTTPS encrypted tunnels to avoid traditional antivirus.
Here are the significant takeaways:
32 million malware variants were blocked during the reporting period
1.7 million network attacks were blocked during the reporting period
67% of malware was delivered via HTTPS connections
72% of malware featured zero-day malware (meaning legacy signature-based AV would have missed it)
Read the full Watchguard report here.
Somewhere -- right now -- countless cybercriminals are planning ransomware attacks and have likely been planning each attack for weeks or even months.
At any given time hundreds of companies could have ransomware cybercriminals invisibly hiding in their network and planning their next move.
You know your USB chargers? They seem innocent and straightforward enough, right? Think again.
According to the Chinese tech giant Tencent, its researchers have discovered a new severe vulnerability to businesses and individuals: USB fast chargers.