SENTINELTM by IDSTRONG

Your ultimate cybersecurity knowledge center

Latest Articles

Maryland Health Department Hit by Ransomware Attack

Maryland Health Department Hit by Ransomware Attack

 A ransomware attack has struck Maryland's Health Department.  The department is attempting to mitigate IT service outages, yet the process is plodding along at a slow pace.

Grass Valley CA Hit by Cyber Attack

Grass Valley CA Hit by Cyber Attack

Grass Valley, a city in California, has been hit by a cyber-attack.  The attack exfiltrated financial data and personal information pertaining to vendors that do business with the city, employees of the city, dependents of those employees, and even the spouses of city employees.

An Inside Look at Chinese Hackers’ Night Sky Ransomware

An Inside Look at Chinese Hackers’ Night Sky Ransomware

A hacking collective in China is distributing Night Sky ransomware through Log4j exploits.  Microsoft has been closely analyzing the crypto-locking malware to identify its source point, characteristics, and potential lines of defense.

USB Kernel Bug Exposes Routers to RCE

USB Kernel Bug Exposes Routers to RCE

 Millions of popular routers have been exposed to RCE in recent weeks.  RCE is an acronym that stands for remote code execution.

An Inside Look at Norton 360’s Built-in Cryptomining Tool

An Inside Look at Norton 360’s Built-in Cryptomining Tool

Norton 360 users should be aware the company's antivirus software contains a cryptomining tool.  There has been a public outcry for the company to remove the cryptomining component as it chews up electricity and memory.

Malware is Prompting Fake Shutdowns on iPhones

Malware is Prompting Fake Shutdowns on iPhones

 A new version of malware is forcing the fake shutdown of iPhones, providing an opportunity for hackers to spy on users secretly.

Cyber Security Researchers Identify Financial Theft Hackers

Cyber Security Researchers Identify Financial Theft Hackers

A group of cyber security specialists has figured out who is behind a sizable financial theft hacking operation.  The hackers went to great lengths to conceal their identities.

Microsoft’s E-Signature Verification Exploited by Malsmoke

Microsoft’s E-Signature Verification Exploited by Malsmoke

Malsmoke, a hacking collective, is administering a campaign to steal information.  The data theft is performed with the use of ZLoader malware.

Apple iOS Users Should be Aware of the “DoorLock” HomeKit Bug

Apple iOS Users Should be Aware of the “DoorLock” HomeKit Bug

Apple's iOS mobile operating system contains a DoS vulnerability.  DoS is short for denial-of-service.  This bug can cause targeted devices to either reboot over and over again or completely crash when synced up with an appliance that is Apple Home-compatible.  

An Inside Look at the Living Off the Land Tactics

An Inside Look at the Living Off the Land Tactics

 Living off the land tactics such as Cobalt Strike and additional red-team tools are legitimate threats to computer users of all types.

IDStrong Weekly Cybersecurity Recap - Dec 31st

IDStrong Weekly Cybersecurity Recap - Dec 31st

The final week of the year has been quite stressful for everyday people as well as those who work in the cybersecurity field.

Aquatic Panda Exploit Targets American Universities

Aquatic Panda Exploit Targets American Universities

Aquatic Panda, an advanced persistent threat group, uses Log4Shell exploit tools to attack colleges and universities in the United States.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home. Read More

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk. Read More

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving. Read More

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

The dark web, also known as the "darknet", is a portion of the internet that lies outside the boundaries of traditional search engines. Read More

Secure Wi-Fi and Wireless Technology Security Tips

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, steal your identity, and grab your personal details. Read More

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Six databases that were owned by Friend Finder Networks, Inc. suffered a massive data breach in 2016, which cost 412 million users their accounts. Read More

Free Identity Exposure Scan
Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close