Hack

PowerSchool Data Breach – Round 2 Extortions
The PowerSchool data breach nightmare of 2024 doesn’t end. Here is a quick rundown to catch up, before I call out some key learnings:In December 2024, PowerSchool was breached by ransomware attackers ...

Cyberattacks on Critical Infrastructures Makes Us Very Vulnerable
Many don’t realize that cyberattacks against Critical Infrastructure sectors, can cause more than an inconvenience of a temporary power outage. Critical Infrastructures are a favorite of aggressive Nation State cyber threats. ...

Ransomware Attack Ends a 150 Year Company
Knights of Old, a 150-year-old UK company, is gone – due to a cyberattack! This terribly unfortunate event is a good example of how cybersecurity matters to every company that depends on ...

The Ever Expanding Attack Surface
Everything, these days, is connected. The fridge, the oven, your fitness tracker, your thermostat, the locks on your front door… It’s the same for businesses as well as at home. Everything is ...

Interview: How Awareness Training Protects Schools from Cyberattacks
When it comes to strengthening the cyber defenses of a K12 school or university, the ...
How to Protect MSP Clients from Scams
Not every organization has the resources to protect itself from cyber attacks. According to a ...

Are Vendors Failing in the Face of Open Source Cyberthreats?
Software vendors must understand the implications a breach in open source software might have on their own product or service. In December 2021, for example, a vulnerability was discovered in Log4j, an ...
What is DNS Spoofing?
Domain Name Server (DNS) spoofing is a type of attack in which the DNS records are altered to redirect the online traffic to a spoofed website that resembles the original destination ...

TrickBot backend source code leaked
TrickBot appears to have become a casualty of the ongoing war in the Ukraine. Yesterday, a member of the Conti cybergang decided to go against the rest of the group by leaking ...
The DHS is inviting hackers to break into its systems, but there are rules of engagement
The United States Department of Homeland Security (DHS) is inviting security researchers to uncover vulnerabilities and hack into its systems, in an attempt to better protect itself from malicious attacks. The DHS ...