Cyber Security Insight

2015 is coming to a close. We’ve seen a lot this past year in the world of technology. 3D printing is breaking new ground, the Internet of Things is connecting our devices like never before, and cyber security is reaching a boiling point; so much...

New Detection Technique - Joomla RCE A deserialization vulnerability in Joomla can lead to remote code execution (RCE). Exploitation of the vulnerability had been observed prior to the release of the official patch from the Joomla team. Since the patch release there has been widespread scanning activity looking...

The holiday season is in full swing. We’re normally not prepared for it, and we scramble to gather ourselves. After Thanksgiving, when most people begin their holiday shopping, it’s common to charge out to local stores and make extravagant purchases. Despite the ability to purchase...

Browsing the Internet is pretty simple these days. Pretty much every computer in almost every place has an Internet connection, and for the average user all it takes to access web pages and other content is a web browser. Some of the most common web browsers...

Emerging Threat - CopyKittens APT activity Matryoshka is malware built by CopyKittens, an espionage group that has been attacking Israeli targets. Matryoshka is spread through spear phishing with a document attached to it. The document has either a malicious macro that the victim is asked to enable or an...

We talk about it all the time, too much for our liking, but data breaches are occurring at an alarming rate. This year is one of the worst on record for data breaches, and there were so many that you probably didn’t hear about all...

Department store giant Walmart is moving into the 21st century by offering a new way for customers to pay at their stores. Using the already available Walmart app customers will be able to use Walmart Pay, a new feature that allows customers to use...

According to the Identity Theft Resource Center (ITRC), as of December 8th, the number of breaches captured on the 2015 ITRC Breach Report totals 732, surpassing last year's record high pace for the same time period (726). With 15 breaches added to the 2015 ITRC Breach List during the past week,...

You’ve probably never thought about the cyber security of other organizations, like the third party vendors with which your company works. Perhaps the security of your clients, partners, and other business relationships does matter to you, but you trust that they are doing enough. While many...

Every holiday season, retailers become prime targets for point of sale (POS) and endpoint-based attacks due to the much higher volume of in-person and online transactions that take place. Attackers know that the high volume of transactions and need to minimize downtime leaves most IT...