GIFShell Exploit: When GIFs Go Bad, Collaboration is Dangerous

GIFShell Exploit: When GIFs Go Bad, Collaboration is Dangerous

| | Blog
It’s a well-known fact that collaboration tools also come with unique security risks, like users inadvertently sharing malicious files. Last week yet another more insidious risk became public knowledge. One of the most popular and arguably the most shared image file types, .gif, is being weaponized to create a remote ... Read More

The Colonial Pipeline Ransomware Attack: Everything We Know

| | Blog
Throughout the week of May 10, 2021, headlines thrived on the havoc a ransomware attack against Colonial Pipelines wrought across the United States. As people rushed to gas stations, some filling plastic bags with gasoline, the federal government declared a state of emergency. As ransomware continues to plague public and ... Read More

Law Firms’ Risk of Emotet Malware Infection

| | Blog
The American Bar Association’s 2019 Legal Technology Survey Report states that 36% of surveyed attorneys claimed that their firms’ systems had been infected with viruses, spyware, and/or malware. The legal industry serves as a particularly attractive target to malicious actors due to databases that host troves of sensitive client information ... Read More
Neutralize Weaponized Files with Votiro's Positive Selection® Technology

Surprise! Phishing tests using file attachments have highest rate of failure

| | Blog
New research by Proofpoint is out, and the results are eye-opening. Their annual report, “State of the Phish,“ highlights that malicious file attachments are a highly effective form of malware delivery that is often underestimated by information security teams worldwide. Malicious file attachments are evading notice 88% of organizations surveyed ... Read More
A picture containing racquetball, game  Description automatically generated

How to Build a Company Culture of Leadership

| | Blog
By: Yehuda Neeman, VP R&D at Votiro Building an organization’s culture is an ongoing process. It requires a constant investment of time, effort, and ongoing evaluation of what needs to be improved, while keeping an eye on the desired goal: a company culture that supports the organization’s success and acts ... Read More

The Federal Government: Ransomware’s Most Desirable Target

| | Blog
As threat actors enhance their arsenals and develop more strategic tactics to target government agencies, how do these agencies assess their risk? More importantly, how can we protect these vulnerable ecosystems? The post The Federal Government: Ransomware’s Most Desirable Target appeared first on Votiro ... Read More
5 Social Engineering Tactics Hackers Use to Trick You Into an Attack

5 Social Engineering Tactics Hackers Use to Trick You Into an Attack

| | Blog
We’ve all been there: It’s your busiest time of day, and you’re multi-tasking like a champ. You quickly glance at a new email that has just hit your inbox — something about a password reset from the company administrator — and CLICK….oops. Welcome to email phishing schemes in 2021. Cybercriminals ... Read More
A Look at the 2020 Garmin WastedLocker Ransomware Attack

A Look at the 2020 Garmin WastedLocker Ransomware Attack

| | Blog
On July 23, 2020, American GPS and fitness-tracker company Garmin was hit by a ransomware attack that caused widespread disruption to the company’s online services and affected millions of users who rely on the technology in their daily lives. The attack encrypted Garmin’s internal network and caused the company to ... Read More
When Job Offers Lead to Cyber Disaster: The Latest LinkedIn Phishing Campaign

When Job Offers Lead to Cyber Disaster: The Latest LinkedIn Phishing Campaign

| | Blog
Job security has taken on a new meaning, with a new cyber-espionage attempt that has recently come to light. Between September to December 2019, employees at select aerospace and military organizations in Europe and the Middle East were targeted with a LinkedIn phishing campaign. The campaign’s malevolent goal was to ... Read More

Object Linking and Embedding Technology: How the Highly Exploited Vulnerability Poses a Major Cybersecurity Threat

| | Blog
Object Linking and Embedding Technology (OLE) enables Microsoft users to connect collateral created in other software applications into Microsoft files. OLE Technology can enhance user experience and productivity through their ability to create compound documents that support a host of software applications, such as Microsoft Windows applications, Corel WordPerfect, Adobe ... Read More