CYREBRO Blog

Why SMBs Are A Prime Cybersecurity Target

Data breaches and stolen information are a regular occurrence in the business world today, with SMBs at almost constant risk of attack. In fact, as mentioned in the 2021 SMB IT security report by Untangle, 43% of cyber-attacks target small businesses, with attacks continuing to increase year by year. This is causing huge issues for…

  • The RDP attack, from advanced solution to attack vector nightmare

    The RDP attack, from advanced solution to attack vector nightmare

    When businesses shifted to remote work at the beginning of the coronavirus pandemic, they had the good fortune of being able to turn to an old solution to keep productivity high–the Remote Desktop Protocol (RDP). Microsoft released the protocol in 1998, but it wasn’t until the pandemic that many businesses realized its usefulness. Naturally, the…

  • Why SMBs Are A Prime Cybersecurity Target

    Why SMBs Are A Prime Cybersecurity Target

    Data breaches and stolen information are a regular occurrence in the business world today, with SMBs at almost constant risk of attack. In fact, as mentioned in the 2021 SMB IT security report by Untangle, 43% of cyber-attacks target small businesses, with attacks continuing to increase year by year. This is causing huge issues for…

  • Threat Actors Using Omicron COVID-19 Phishing Lures

    Threat Actors Using Omicron COVID-19 Phishing Lures

    Over the last few weeks, threat actors have been launching phishing scams which leverage people’s fears and anxieties over the Omicron COVID-19 variant. The scams either inject the Dridex banking malware into a victim’s computer or other malware that collects passwords, credentials, and personal or financial data. Informing all employees about the threat is the…

  • Insider Threats Are Worse Than You Thought

    Insider Threats Are Worse Than You Thought

    The Trojans figured out that it’s much easier to open a gate from the inside rather than try and batter it down from the outside, and your organization is no different. Insiders may be using the same tactics as the Trojans did all those years ago on your organization today. In this article, we will…

  • Happy Holidays? Not if Hackers Have Their Way

    Happy Holidays? Not if Hackers Have Their Way

    Cybercriminals are savvy, calculating, and methodical. Like any good thief, they do their homework, investigating potential targets, stalking them to track habits, and identifying weak entry points. They are also patient, waiting for the perfect time to launch an attack. Attackers hit the hardest when defenses are at their lowest. More often than not, that…

  • Log4Shell hits big players with critical 0-day exploit

    Log4Shell hits big players with critical 0-day exploit

    [Last updated Dec. 19, 2021] A recently discovered Log4j vulnerability (Log4Shell, CVE-2021-44228) in the Apache utility that allows unauthenticated remote code execution (RCE) and server take over is said to be exploited in the wild. Due to how widely used the Apache tool is, affecting companies such as Amazon, Apple, Cisco, Steam, Tesla, Twitter, and many…

Loading

Sign Up for Updates