SENTINELTM by IDSTRONG

Your ultimate cybersecurity knowledge center

Latest Articles

Shutterfly Attacked by Ransomware Hackers

Shutterfly Attacked by Ransomware Hackers

 Shutterfly, the popular picture-sharing website, has been hit by a ransomware attack.  The company has not revealed much about the attack but for the fact that it has disrupted its operations.

Cyber Attack Spurs Malicious Communications to Hellmann Customers

Cyber Attack Spurs Malicious Communications to Hellmann Customers

Hellmann Worldwide Logistics is warning customers that they might be the target of social engineering attacks. Hellmann, a logistics provider, was struck by a ransomware attack earlier in December.    

The Equation Hacking Group’s DanderSpritz Framework is Causing Problems

The Equation Hacking Group’s DanderSpritz Framework is Causing Problems

Digital security specialists are revealing the details of a malware framework dubbed DanderSpritz.  The Equation Group Hackers are responsible for this hack.

Ransomware Variants are on the Rise

Ransomware Variants are on the Rise

Ransomware hackers are rapidly progressing.   The digital thieves have advanced their attacks to include even more complex tactics for deploying malware on targeted systems.

Hackers Post Sensitive Police Data on the Dark Web

Hackers Post Sensitive Police Data on the Dark Web

Ransomware hackers have posted confidential police information on the shady corner of the internet known as the dark web.   The data was stolen from the United Kingdom police.

Backdoors Discovered Within Auerswald VoIP

Backdoors Discovered Within Auerswald VoIP

Digital security specialists have found hidden backdoors within Auerswald VoIP systems.   Made in Germany, these systems are intended to provide a secure means of engaging in voice calls.

Half a Million Android Users Hit by Joker Malware

Half a Million Android Users Hit by Joker Malware

More than 500,000 Android users are waking up to find their smartphone has a new form of malware. Dubbed Joker, the malware is transmitted in the form of an app through the Google Play Store.

More Than 35,000 Computers Infected by PseudoManuscrypt

More Than 35,000 Computers Infected by PseudoManuscrypt

PseudoManuscrypt has infiltrated a whopping 35,000+ computers in 2021. This malware botnet's name is a reference to Manuscrypt malware.

Cyber Security Recap – Dec 18th

Cyber Security Recap – Dec 18th

 Hackers are making their presence felt across the globe as we transition to the new year.   Sort through the latest digital security news, and you'll find a seemingly endless number of reports about spyware, malware, DDoS attacks, and other digital infiltrations.

Malware Without a File Bypasses Detection Through Windows Registry

Malware Without a File Bypasses Detection Through Windows Registry

A remote access Trojan based in JavaScipt avoids identification with a fileless approach.   The Trojan is implemented through social engineering.

IIS Server Module Puts Microsoft Exchange Credentials at Risk

IIS Server Module Puts Microsoft Exchange Credentials at Risk

Hackers are using an IIS server module to target Microsoft exchange credentials.   The hackers use a binary to steal the credentials.

The Log4j Bug Might Cause Problems for Years

The Log4j Bug Might Cause Problems for Years

The recent emergence of the bug known as Log4j can to lead to exploits for the foreseeable future.   Digital security experts insist this unique vulnerability sets the stage for cyber miscreants to execute harmful attacks on websites owned and operated by businesses, governments, and other parties.

Featured Articles

How to Buy a House with Bad Credit

How to Buy a House with Bad Credit

Buying your own home is the American Dream, but it might seem out of reach to those with bad credit. However, the good news is, if your credit is less than perfect, you do still have options and in most cases, can still buy a home. Read More

How Secure Is Your Password? Tips to Improve Your Password Security

How Secure Is Your Password? Tips to Improve Your Password Security

Any good IT article on computers and network security will address the importance of strong, secure passwords. However, the challenge of good passwords is that most people have a hard time remembering them, so they use simple or obvious ones that pose a security risk. Read More

Top 10 Senior Scams and How to Prevent Them

Top 10 Senior Scams and How to Prevent Them

Senior scams are becoming a major epidemic for two reasons. First, seniors often have a lot of money in the bank from a life of working hard and saving. Read More

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

What is the Dark Web: Things You Need To Know Before Accessing The Dark Web

The dark web, also known as the "darknet", is a portion of the internet that lies outside the boundaries of traditional search engines. Read More

Secure Wi-Fi and Wireless Technology Security Tips

Secure Wi-Fi and Wireless Technology Security Tips

Your Wi-Fi network is another handy access point that hackers use to infiltrate your computers, steal your identity, and grab your personal details. Read More

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Adult Friend Finder Hacked, 412 Million Accounts Exposed

Six databases that were owned by Friend Finder Networks, Inc. suffered a massive data breach in 2016, which cost 412 million users their accounts. Read More

Free Identity Exposure Scan
Free Identity Exposure Scan
Instantly and Securely Check if Your Personal Information is Exposed on the Dark Web or Sold by Data Brokers
Please enter first name
Please enter last name
Please select a state
Close
Free Identity Threat Scan
Instantly Check if Your Personal Information is Exposed
All fields below are required
Please enter first name
Please enter last name
Please enter a city
Please select a state
Please enter an age
Please enter an email address
Close