Latest Articles
Maryland Health Department Hit by Ransomware Attack
A ransomware attack has struck Maryland's Health Department. The department is attempting to mitigate IT service outages, yet the process is plodding along at a slow pace.
Grass Valley CA Hit by Cyber Attack
Grass Valley, a city in California, has been hit by a cyber-attack. The attack exfiltrated financial data and personal information pertaining to vendors that do business with the city, employees of the city, dependents of those employees, and even the spouses of city employees.
An Inside Look at Chinese Hackers’ Night Sky Ransomware
A hacking collective in China is distributing Night Sky ransomware through Log4j exploits. Microsoft has been closely analyzing the crypto-locking malware to identify its source point, characteristics, and potential lines of defense.
USB Kernel Bug Exposes Routers to RCE
Millions of popular routers have been exposed to RCE in recent weeks. RCE is an acronym that stands for remote code execution.
An Inside Look at Norton 360’s Built-in Cryptomining Tool
Norton 360 users should be aware the company's antivirus software contains a cryptomining tool. There has been a public outcry for the company to remove the cryptomining component as it chews up electricity and memory.
Malware is Prompting Fake Shutdowns on iPhones
A new version of malware is forcing the fake shutdown of iPhones, providing an opportunity for hackers to spy on users secretly.
Cyber Security Researchers Identify Financial Theft Hackers
A group of cyber security specialists has figured out who is behind a sizable financial theft hacking operation. The hackers went to great lengths to conceal their identities.
Microsoft’s E-Signature Verification Exploited by Malsmoke
Malsmoke, a hacking collective, is administering a campaign to steal information. The data theft is performed with the use of ZLoader malware.
Apple iOS Users Should be Aware of the “DoorLock” HomeKit Bug
Apple's iOS mobile operating system contains a DoS vulnerability. DoS is short for denial-of-service. This bug can cause targeted devices to either reboot over and over again or completely crash when synced up with an appliance that is Apple Home-compatible.
An Inside Look at the Living Off the Land Tactics
Living off the land tactics such as Cobalt Strike and additional red-team tools are legitimate threats to computer users of all types.
IDStrong Weekly Cybersecurity Recap - Dec 31st
The final week of the year has been quite stressful for everyday people as well as those who work in the cybersecurity field.
Aquatic Panda Exploit Targets American Universities
Aquatic Panda, an advanced persistent threat group, uses Log4Shell exploit tools to attack colleges and universities in the United States.