Data Compromise Attacks & How They Happen

The Identity Theft Resource Center (ITRC) is a non-profit organization established more than two decades ago to help businesses and consumers minimize the risk and impact of identity crimes. …Log into your iPressGo account to read the full article.

Multifactor Authentication FAQs

Multifactor authentication (MFA) is highly effective yet often misunderstood tool to fend off account compromise attacks. Here are the answers to some frequently asked questions about MFA. …Log into your iPressGo account to read the full article.

Quantum Locker Ransomware Escalates

Security analysts have recently observed attacks with the Quantum ransomware that escalate quickly, allowing little time for defenders to react. Malicious actors are using the IcedID malware to obtain initial access to the target system, which then deploys Cobalt Strike to perform subsequent activities like establishing remote access. Once actors accomplish these steps, they can use Quantum Locker to encrypt …

Can Microsoft Teams be Hacked?

Microsoft Teams is an attractive target from a hacker’s point of view. It has millions of users who typically work for enterprise-level organizations, many of whom share sensitive information on it. Microsoft Teams has multiple vulnerabilities that hackers are known to be exploiting, but it’s also likely to have others that aren’t public knowledge. …Log into your iPressGo account to read …

Email Account Hijacking Is on the Rise

Cybercriminals sent millions of malicious messages from compromised email accounts last year — and that number is expected to rise. Find out how cybercriminals take over email accounts and what businesses can do to protect them. …Log into your iPressGo account to read the full article.

Beware of Vidar Spyware Masquerading within Microsoft

Security analysts have identified the Vidar malware as the payload in a phishing campaign that exploits Microsoft help files. Diana Lopera, researcher for Trustwave, announced on March 24, 2022 that the actors are concealing Vidar in Microsoft Compiled HTML Help (CHM) files to prevent anti-malware applications from detecting it. …Log into your iPressGo account to read the full article.

Google Releases Fix for Zero-Day Chrome Bug

A zero-day bug typically refers to any bug that’s unknown to the developer, although it originally referred only to bugs in unreleased software. …Log into your iPressGo account to read the full article.

New Ransomware Strain Can Render Infected Computers Unusable

Researchers have discovered a new strain of the LokiLocker ransomware that can render a Windows computer useless with a single keystroke. Learn how this ransomware works and what businesses can do to protect against it. …Log into your iPressGo account to read the full article.

Cybercriminals Are Using a New Tool to Carry Out BEC Scams

The FBI recently issued an alert about a new tool that cybercriminals are using in business email compromise (BEC) scams. Find out what this new tool is and how cybercriminals are using it. …Log into your iPressGo account to read the full article.

Cryptbot Targeting all Chrome Browsers

Security researchers from Ahn Lab report they have observed a new version of CryptBot, which is a malware for Windows systems with Chrome browsers that steals information from its host device. This information typically includes browser credentials and history, cookies, cryptocurrency wallets and credit cards. …Log into your iPressGo account to read the full article.