SENTINELTM by IDSTRONG

Your ultimate cybersecurity knowledge center

Latest Articles

What is a Vishing Attack and How to Avoid It?

What is a Vishing Attack and How to Avoid It?

Hackers and scammers are crafty; they're always coming up with new ways of tricking people into divulging personal information.

What is a Botnet Attack?

What is a Botnet Attack?

Cyber-attacks are increasingly common and change rapidly as technology evolves and scammers become savvier. A botnet attack is a serious security threat, and individual and business networks can be targeted.

What is a Keylogger: How Attackers Can Monitor Everything You Type

What is a Keylogger: How Attackers Can Monitor Everything You Type

‍Keyloggers are spyware applications that record and monitor user keystrokes, capturing every website URL, log-in name, password, social media username, and more that you type.

Polkit Flaw Allows Unprivileged to Obtain Root Access in Linux

Polkit Flaw Allows Unprivileged to Obtain Root Access in Linux

The failure to address a digital security vulnerability in the Linux operating systems is causing significant problems.  This system weakness is more than a decade old.

Watering-Hole Attacks Transmit DazzleSpy Backdoor to macOS

Watering-Hole Attacks Transmit DazzleSpy Backdoor to macOS

Hackers are using a unique backdoor to compromise Apple's macOS operating system. The backdoor infection occurs through specialized watering-hole cyber-attacks.

Ransom Cartel Version of REvil Ransomware Identified

Ransom Cartel Version of REvil Ransomware Identified

It appears a modification of REvil ransomware is wreaking havoc in the form of Ransomware Cartel.  Despite the attack's moniker, digital security specialists believe the ransomware stems from a group as opposed to a cartel.

Chinese Hackers are Using a new UEFI Firmware Called MoonBounce

Chinese Hackers are Using a new UEFI Firmware Called MoonBounce

Hackers based in China are implementing a new targeted digital attack using UEFI firmware implants.  The attack stems from the Wintti advanced persistent threat group known as APT41.

Personal Information of More Than Half a Million at Risk After Red Cross Cyber-Attack

Personal Information of More Than Half a Million at Risk After Red Cross Cyber-Attack

A cyber-attack levied on the Red Cross has jeopardized the highly sensitive personal information of 515,000 individuals.  The organization has requested that the digital attackers not leak, sell, or share the information plucked from its database.

A Look at FIN8 Hackers’ White Rabbit Ransomware

A Look at FIN8 Hackers’ White Rabbit Ransomware

The hacking collective known as FIN8 appears to be using a new form of ransomware referred to as White Rabbit.  Here is a quick look at the new form of ransomware and an explanation as to why it is emerging as a major digital security hurdle.

VPNLab Shut Down by Europol

VPNLab Shut Down by Europol

Cyber miscreants' preferred VPN service, VPNLab. net, has been shut down. Europol put the kibosh on VPNLab earlier this week.

Apple Safari Bug Allows for Web User Tracking

Apple Safari Bug Allows for Web User Tracking

Apple Safari users should be aware that the browser has an unpatched bug that permits cross-site user tracking.  The bug is present within the IndexedDB API of Apple Safari 15.

Cybersecurity Weekly Recap - January 14th

Cybersecurity Weekly Recap - January 14th

The digital attacks on businesses, governments, and other organizations continue to escalate as we transition to the second half of January.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home. Read More

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk. Read More

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving. Read More

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

The dark web, also known as the "darknet", is a portion of the internet that lies outside the boundaries of traditional search engines. Read More

Secure Wi-Fi and Wireless Technology Security Tips

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, steal your identity, and grab your personal details. Read More

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Six databases that were owned by Friend Finder Networks, Inc. suffered a massive data breach in 2016, which cost 412 million users their accounts. Read More

Free Identity Exposure Scan
Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close