A reminder that, while MFA is an important tool and better than most alternatives, there are still holes and ways around all defenses. Story on ZDNet
Author: ceadmin
Ransomware: Most attacks exploit these common cybersecurity mistakes – so fix them now, warns Microsoft
More basic preparation that everyone can follow in order to reduce the exposures. Story on ZDNet
Fake DDoS-Protection Pages on WordPress Sites Serve Up Malware
There is no end to the angles that can be used to attack. The more angles in use, the more victims that are available, and the higher the criminal profits. Story on PCMag
Cookie theft threat: When multi-factor authentication is not enough
We have to do better as an industry developing tech solutions that are sustainable. Story on TechRepublic
How to protect your organization from ransomware-as-a-service attacks
We can all step up to help our organizations do a better job of security. Story on TechRepublic
The 14 Scariest Things We Saw at Black Hat 2022
How did they manage to stop at only 14? Story on PCMag
TikTok’s iOS In-App Browser Monitors All Keyboard Input and Screen Taps
Social Media – You’ll never find a more wretched hive of scum and villainy. (smile) Story on PCMag
How phishing attacks are exploiting Amazon Web Services
The Cloud is safe and secure. Of course it is. Story on TechRepublic
Browser extension threat targets millions of users
How can you be a target? Because millions are every day. Story on TechRepublic
Are ethical hackers the digital security answer?
Are ethical hackers your answer? Story on TechRepublic