PowerSchool Data Breach – Round 2 Extortions

PowerSchool Data Breach – Round 2 Extortions

 The PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:In December 2024, PowerSchool was breached by ransomware attackers ...
Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable

Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable

 Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage.   Critical Infrastructures are a favorite of aggressive Nation State cyber threats.  ...
Ransomware Attack Ends a 150 Year Company

Ransomware Attack Ends a 150 Year Company

 Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on ...
Cybernetic Vulnerability: The API Connection

The Ever Expanding Attack Surface

Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is ...
Kevin Mitnick Password Manager Hack Demo

Interview: How Awareness Training Protects Schools from Cyberattacks

When it comes to strengthening the cyber defenses of a K12 school or university, the ...

How to Protect MSP Clients from Scams

| | Blog, Hack, MSPs and Partners
Not every organization has the resources to protect itself from cyber attacks.  According to a ...
vulnerability management, thrat, Jenkins CI/CD vulnerability

Are Vendors Failing in the Face of Open Source Cyberthreats?

Software vendors must understand the implications a breach in open source software might have on their own product or service. In December 2021, for example, a vulnerability was discovered in Log4j, an ...
Security Boulevard

What is DNS Spoofing?

| | Hack, spoofing
Domain Name Server (DNS) spoofing is a type of attack in which the DNS records are altered to redirect the online traffic to a spoofed website that resembles the original destination ...
TrickBot backend source code leaked

TrickBot backend source code leaked

| | Hack
TrickBot appears to have become a casualty of the ongoing war in the Ukraine. Yesterday, a member of the Conti cybergang decided to go against the rest of the group by leaking ...

The DHS is inviting hackers to break into its systems, but there are rules of engagement

The United States Department of Homeland Security (DHS) is inviting security researchers to uncover vulnerabilities and hack into its systems, in an attempt to better protect itself from malicious attacks. The DHS ...