What is the Rig Exploit Kit?

In early 2022, security analysts at Bitdefender discovered a new malware campaign that delivers RedLine via the RIG Exploit Kit (EK). The use of this EK has dropped dramatically over the last few years because it exploits vulnerabilities in web browsers that are introduced by plug-ins like Microsoft Silverlight and Flash Player. These plug-ins are rarely used today, as modern …

Can Microsoft Teams be Hacked?

Microsoft Teams is an attractive target from a hacker’s point of view. It has millions of users who typically work for enterprise-level organizations, many of whom share sensitive information on it. Microsoft Teams has multiple vulnerabilities that hackers are known to be exploiting, but it’s also likely to have others that aren’t public knowledge. …Log into your iPressGo account to read …

How to Setup a Secure Home Office Network

The COVID-19 pandemic has greatly increased the number of people working from home, making home office networks routine rather than an exception. Home offices typically use a Wi-Fi network to connect wireless devices such as computers, phones, IP cameras, TVs and voice assistants to the internet. This type of network requires some basic steps to prevent a hacker from gaining …

Conti Ransomware Takes Over TrickBot

TrickBot was originally a Trojan that stole banking credentials, but it has evolved into a modular malware with multiple sophisticated capabilities. These include system reconnaissance, persistence and the ability to deliver ransomware. However, the Conti ransomware syndicate now plans to replace TrickBot with BazarBackdoor, which has greater stealth. …Log into your iPressGo account to read the full article.

Memento Ransomware Uses WinRAR to Lock your Files

Ransomware prevents its victims from accessing its own files until they comply with the attackers’ demands, which is usually a monetary payment. The traditional method of accomplishing this task is to encrypt files with the promise of providing the victim with the decryption key once the ransom is paid. A new ransomware group called Memento Team is using a new …

A New Ransomware Has Been Discovered

Cyber criminals are using a new ransomware dubbed Yanluowang to encrypt a target network’s files. This ransomware is so named because it places an extension of “yanluowang” on the files it encrypts. In addition to the usual demand for money in exchange for decrypting the files, this latest ransomware also threatens to launch additional attacks against the victim organization, and …

The New ZLoader Ransomware Variant

Search engines like Google are displaying search results that redirect the user to malicious links when they search for TeamViewer remote desktop software. These links download ZLoader malware onto the users’ system, creating a stealthy infection path that allows the attacker to install additional malware without detection. …Log into your iPressGo account to read the full article.

T-Mobile Breach Exposed the Personal Data of 54 Million Customers

The T-Mobile data breach in August 2021 was massive. Find out what data was stolen, what T-Mobile is doing to help customers affected by the breach, and how to protect yourself even if you are not a breach victim. …Log into your iPressGo account to read the full article.

Phishing Deep Dive: Classic Phishing

Classic phishing is the most common type of phishing. Discover what it is and how to protect your company from this type of attack. …Log into your iPressGo account to read the full article.