News

Tips, Tricks, and Thought Leadership

Subscribe

2 min read

The Fox is Guarding the Henhouse: Microsoft enters the MSSP Space

Microsoft has decided it's time to dip its big toe in the Managed Security Services Provider (MSSP) space with three brand new products, Microsoft...

Read More

2 min read

Beware Random Thumb Drives: Raspberry Robin Malware...

As if any well-minded cybersecurity professional would be trusting of the little buggers in the first place. Anywho, there's a new malware making the...

Read More

1 min read

Bad Actors Still Targeting Remote Workers (Link)

Aamir Lakhani, a global security strategist, and researcher at Fortinet's FortiGuard Labs, has shared an article on ThreatPost where he discusses the...

Read More

2 min read

2021's Top 15 Software Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a joint cybersecurity advisory that lists the top 15 exploited software...

Read More

3 min read

Ransomware Reminder: What to do BEFORE you're infected...

There's been a 715% INCREASE in Ransomware attacks in 2020. 

Read More

2 min read

FBI Alert: Blackcat Ransomware-as-a-Service (RAAS)

The Federal Bureau of Investigation (FBI) has issued a new FLASH alert regarding BlackCat (aka ALPHV, aka Noberus), a ransomware-as-a-service linked...

Read More

6 min read

ALERT: APT Cyber Tools Targeting ICS/SCADA Devices

Summary

Actions to Take Today to Protect ICS/SCADA Devices:• Enforce multifactor authentication for all remote access to ICS networks and devices...

Read More

5 min read

What is a Social Engineering Attack?

I wanted to take a moment to dive into something called “Social Engineering."

Parts of what I bring up is going to sound a bit familiar. There’s...

Read More

1 min read

State Department Launches New Cybersecurity Bureau...

The State Department has announced the launch of a brand new bureau dedicated to making cybersecurity a part of US foreign policy.

Read More

Three Cybersecurity Fundamentals Businesses Get Wrong

Great article from Forbes today regarding the three things businesses get wrong when it comes to cybersecurity. It's definitely worth reading. You...

Read More

1 min read

Okta Has a Problem

Okta, the Identity and Access Management platform has a huge problem on its hands. The company, used by thousands of organizations around the world,...

Read More

5 min read

SHIELD's Up. Russian Cyberattacks Incoming...

War is raging in Ukraine. We might feel relatively removed here in the US, far from the bomb blasts and artillery strikes. While the threat of...

Read More

6 min read

WhisperGate: The Newest Russian Cyberthreat

Not all the bombs falling across Ukraine today are traditional munitions. Some of them are in fact relegated to the cybersphere. Most notably is...

Read More

3 min read

New News from Iranian Hacking Groups is Bad for Everybody...

Our friends over at Cybereason published two new studies today (February 1st, 2022) regarding recent exploits from Iranian hacking groups Phosphorus...

Read More

1 min read

CISA adds 8 Vulnerabilities to Active Bug List...

Eight actively exploited bugs have been added to the US Cybersecurity & Infrastructure Security Agency's Known Exploited Vulnerabilities Catalog. The...

Read More

2 min read

New Microsoft Edge Features Includes "Super-Duper Secure Mode..."

Microsoft is trying out some new features in its latest Edge beta releases including a brand spanking new browsing mode called...wait for...

Read More

2 min read

Don't Plug in USB Drives you Receive in the Mail...

The FBI is reporting that cybercriminals have been soliciting USB drives containing malware via the United States Post Office (USPS) and the United...

Read More

1 min read

SysJoker: Windows, Linux and macOS at Risk...

A newly discovered form of malware, called SysJoker poses a threat to the top three operating systems: Windows, Linux, and macOS. If exploited...

Read More

2 min read

List: Log4j Vulnerability Scanners...

It might be a new year, but we still have the same old problems. Log4j, like COVID-19 and its many variants, is still circulating our collective...

Read More

1 min read

CVE-2021-44228 (Log4Shell Vulnerability): What you Need to Know...

There's a particularly nasty vulnerability stalking the internet. It's called CVE-2021-44228 and it's making heads spin on shoulders the world over.

Read More

5 min read

New Malvertising Campaign Caught Poking at Chrome's Backdoor...

I bet that headline caught your attention! I regret nothing! You clicked, didn't you?

Read More

3 min read

Bad Guys Offer Millions in Bug Bounty Money...

Being in the ransomware business must be very, very profitable. Why may you ask? I'll tell you why; a recent report from Digital Shadows says that...

Read More

6 min read

New CISA Directive: What You Need to Know About BOD 22-01...

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new Binding Operational Directive (BOD 22-01) that's designed to reduce...

Read More

3 min read

Microsoft Warns of Major Password Spraying Attack...

According to Microsoft, Nobelium, the same hacking group behind the SolarWinds attack from last year, is back wrecking havoc in IT systems world wide.

Read More

1 min read

Webinar - Security7 + OneLogin (w/Technical Demo)

{% video_player "embed_player" overrideable=False, type='scriptV4', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False,...
Read More

Webinar - Security7 + OneLogin

{% video_player "embed_player" overrideable=False, type='scriptV4', hide_playlist=True, viral_sharing=False, embed_button=False, autoplay=False,...
Read More

1 min read

Jupyter Malware: What You Should Know...

There's a .NET info-stealer making the rounds. It's called Jupyter, and it's very good at avoiding end-point protection software.

Read More

3 min read

CISA Announcement: Conti Ransomware Service & ZLoader...

The Cybersecurity and Infrastructure Security Agency (CISA) has released a new alert and it's pretty important because it could impact everybody...

Read More

3 min read

Scammers Steal $2.3 Million from New Hampshire Town

This story is going to sound all too familiar... A small town has been victimized by scammers via a Phishing Attack and $2.3 million of tax-payer...

Read More

3 min read

The T-Mobile Hack: At Least 49 Million Accounts Compromised...

Telecom giant T-Mobile has been hacked. AT LEAST 49 million accounts have been compromised. The leaked data includes things like:

Read More

2 min read

CISA Names Top 12 Vulnerabilities for 2021

The Cybersecurity & Infrastructure Security Agency (CISA) along side the Australian Cyber Security Center (ACSC), the United Kingdom's National Cyber...

Read More

4 min read

Accenture Ransomware Attack: What You Should Know About LockBit...

News broke late Wednesday night (August 11) that Accenture, a Fortune 500 consulting company, was attacked and had servers compromised by the LockBit...

Read More

5 min read

SOAPA is the Key to a Successful Active Defense Security Posture

I’ve seen a lot of talk regarding an information security posture referred to as Active Defense. It’s becoming more popular across the industry. The...

Read More

1 min read

NSO's Pegasus Flies Again!

Amnesty International has released a new Forensic Methodology Report about NSO Group's Pegasus Software and it's pretty scary.

Read More

2 min read

U.S. State Dept. Introduces NEW Cybercriminal Reward Program

If you look closely at the walls of your local Post Office you might see something out of an old western movie. Wanted posters. Yes, that's right....

Read More

3 min read

Embracing Cybersecurity in the Workplace...

Change is hard. No matter how old you get, change will always be difficult to accept. It doesn't matter where that change occurs. Change can affect...

Read More

1 min read

Jen Easterly Confirmed as CISA Director...

Our long national nightmare is over...Jen Easterly has been named Director for the Department of Homeland Security's (DHS) Cybersecurity &...

Read More

3 min read

Attention C-Level Executives: A Compliance Standards Primer...

If you're at the top of the ladder, you've probably got a lot on your plate. Budgets, personnel issues, sales numbers, shareholders, etc. You're busy...

Read More

2 min read

New SolarWinds Related Breaches Reported...

Chalk another one up for the bad guys...

Read More

3 min read

How to Talk About InfoSec with your C-Suite

Cybersecurity is becoming more prominent. At least publicly. If you work within the industry, you already know how important it is to have a healthy...

Read More

1 min read

Patch Tuesday: Microsoft Releases 50 Security Updates

Microsoft has released a WHOPPING 50 security updates! This most recent "Patch Tuesday" focused on patching everything from remote code execution...

Read More

1 min read

Patch, Patch, Patch! Google Chrome Zero Day Vulnerability Uncovered!

Are you a Chrome user? If so you better update your software. Google has just announced a new software update that's designed to take care of a...

Read More

3 min read

RockYou2021: 8.4 Billion Passwords Leaked

Ugh...

A 100GB text file has been leaked on the dark web and it contains 8.4 BILLION passwords.  I'll say again...ugh.

According to a report by ...

Read More

3 min read

Amazon Sidewalk: What You Should Know...

Amazon just announced a new product. It's called "Sidewalk," and it's designed to provide internet service to remote Amazon devices (think Echos,...

Read More

8 min read

Halfway Through 2021: 30 Cybersecurity Breaches of Note

As we enter the second half of 2021, I thought it'd be good to summarize 30 of the most noteworthy security breaches we've seen so far this year....

Read More

1 min read

Zeppelin Reunites...the Ransomware. Not the Band. Sorry.

I apologize to all of you Led Zepplinists in the audience, but I couldn't help myself. A fairly recent form of ransomware, called Zeppelin (duh) has...

Read More

WMUR Interview

Security7 was on TV this past weekend! Watch Jay Smith, our President of Sales talk with Fred Kocher of WMUR to talk about Ransomware and the general...

Read More

2 min read

REPORT: Virtual Cyrillic Keyboard Protects from DarkSide Ransomware...

Originally this article was going to be about The DarkSide group breaking up and shutting down shop after losing access to their servers and all...

Read More

4 min read

DarkSide Hacking Group Brings Colonial Pipeline to its Knees...

On May 6th, a ransomware infestation from a Russian hacking group has shut down the 5,500 mile-long fuel pipeline that feeds MOST of the United...

Read More

2 min read

Is Apple AirDrop Secure? New Research Says Maybe Not...

A new press release from the Technical University of Darmstadt in Germany is lifting the lid on some pretty significant security issues regarding...

Read More

3 min read

The ParkMobile Hack: What You Need to Know...

If you live in a city with parking meters (as many do here in New England) there's a good chance you've at least encountered the ParkMobile system....

Read More

1 min read

President Announces New 100 Day Cybersecurity Plan for Power Industry

There's long been concern that malicious actors will one day target the United States electrical grid. To help counter any sort of attack leaving us...

Read More

1 min read

The FBI is Hacking Exchange Servers...to FIX Them!

The headline isn't clickbait, I promise. The Federal Bureau of Investigations is hacking into Microsoft Exchange Servers across the country...

Read More

2 min read

Password Blunders Abound!

A new Ponemon Institute report (sponsored by Keeper Security Inc.) has revealed some SHOCKING password-related missteps. The report can be read here,...

Read More

2 min read

The April 3rd Facebook Hack: What You Need to Know...

Late last week the news broke regarding a massive PII leak, impacting close to 553,000,000 Facebook users across 106 countries...including 32 million...

Read More

4 min read

Ubiquiti Hack Larger Than Previously Reported

Early this year, Ubiquiti Networks announced to their customers that they'd been breached. The Internet of Things (IoT) device maker let customers...

Read More

1 min read

Hackers Fail to Blame Exchange Server Attacks on Brian Krebs

Brian Krebs has quite the reputation in the cybersecurity community. A good reputation too. He's not some nefarious dweeb out there trying to cash in...

Read More

3 min read

FBI ICS 2020 Report Highlights

2020...what a year. It's one that many of us will ever truly forget. Pandemics, politics, death, and destruction, 2020 brought it all. One of the...

Read More

2 min read

What is CMMC? A Beginner's Guide

Security7 Networks has seen a sharp uptick in people requesting immediate support regarding the Department of Defense's  Cybersecurity Maturity Model...

Read More

1 min read

New JavaScript Trick Allows Phishing Sites to Detect Virtual Machines

The MalwareHunter Team has discovered a new trick being leveraged by Phishing websites.

Read More

1 min read

Security Cameras at Tesla, Cloudflare, and More Hacked

It's easy to forget sometimes that the IoT encompasses more than just end-points and network devices. To help drive home that fact, Bleeping Computer...

Read More

1 min read

Microsoft Exchange Server Attack Timeline

Brian Krebs over at Krebsonsecurity.com has put together a handy timeline regarding the recent string of Microsoft Exchange Server attacks.

Read More

1 min read

Microsoft Exchange Attack: 30,000 Servers Compromised

If you haven't patched your Microsoft Exchange Server recently you should seriously consider it. There are FOUR "zero-day" vulnerabilities currently...

Read More

1 min read

The Gootkit Information Stealer

Ignore the adorable tree baby. This isn't about Groot. It's about Gootkit, a particularly nasty information stealer that's currently being...

Read More

1 min read

Ryuk Ransomware Now Deadlier

A new Ryuk ransomware variant has appeared in the wild, now with  worm-like capabilities.

Read More

1 min read

Mac Users Beware! Silver Sparrow Has Arrived...

There's a new malware threat specifically targeting Macs. It's called Silver Sparrow . Details are still relatively scarce but here's what we know...

Read More

3 min read

The TrickBot Botnet Resurgence Via Phishing Attacks

A botnet that's plagued people on and off since 2016 has reared its ugly head again, this time focusing on phishing campaigns that target legal firms...

Read More

3 min read

Sprite Spider: What You Need to Know

A ransomware team first detected in 2015 is poised to become one of the biggest threat actors of 2021, according to CrowdStrike.

Read More

2 min read

Enable MFA on Your SonicWall Secure Mobile Access Devices (SMA) Immediately...

If you've got a SonicWall  Secure Mobile Access Device (SMA) you should seriously consider activating Multi-Factor Authentication on it.

Read More

1 min read

Update to iOS 14.4 When You Can...

Apple's released a new software update and you should probably take the time to update your device. The update directly addresses a few security...

Read More

2 min read

Cybersecurity Predictions: 2021

It's that time of the year again! What time is that, you ask? It's time for our annual cybersecurity prediction post!* These predictions come from a...

Read More

5 min read

Our Partners and the SolarWinds Hack...

Honestly...2020 has been a heck of a year. A pandemic, a recession, a contentious election, and then a hack that impacted not only 18,000 business...

Read More

2 min read

SolarWinds and FireEye Breached: What You Should Know...

It's been a heck of a month for cybercriminals. Two major cybersecurity firms had their lunch eaten by hackers

Read More

2 min read

CISA: What Is It and What Does It Do?

We (Security7 Networks), or rather, I (the author of this post), am not interested in this blog becoming political in any way. We're here to educate,...

Read More

2 min read

Software Concepts International LLC Achieves ISO 27001 Certification

Security7 Networks is pleased to announce that Software Concepts International, LLC (SCI), has achieved ISO 27001 certification.The ISO 27001...

Read More

1 min read

7 Cybersecurity Predictions for 2021...

SecurityMagazine.com put up an interesting article this week that includes their TOP 7 cybersecurity predictions for 2021. Besides them stealing one...

Read More

1 min read

RagnarLocker Group Takes Out Ad on Facebook to Shame Victim

Ransomware is a huge threat right now. It's everywhere you look. Business after business is falling to the plight. We've been covering this for...

Read More

2 min read

URGENT: Massachusetts Unemployment Fraud Scheme

Due to the Covid-19 pandemic, millions of Americans are out of work. Unemployment is at the highest point it has been in years. Things are bad out...

Read More

2 min read

REPORT: Cybersecurity in the Remote Work Era...

It's tough to write about Covid-19. It's tough to work in this mixed up, messed up Covid world. Things aren't easy for anybody. But at least we're...

Read More

3 min read

Ransomware: How to Protect Yourself

Securty7 Networks has PERSONALLY seen an uptick in ransomware attacks, and we're not alone. Security professionals around the globe are facing the...

Read More

2 min read

Paying a Ransomware Ransom Might Lead to Big Fines...

Your day couldn't be going worse. Someone in the office clicked on a link they shouldn't have. Now the entire network is compromised with Ransomware....

Read More

2 min read

7 Sneaky Cybersecurity Threats

Not every cyber-attack is a large scale data breach or ransomware attack. Even the average computer user is liable to encounter some sort of...

Read More

5 min read

How to Improve a Slow Home Internet Connection!

Are you still working from home? That's probably a silly question, of course, you are. Most everybody is still working from home. If you're anything...

Read More

1 min read

ZeroLogon Bites Back

Last week we posted a blog article regarding the ZeroLogon exploit, or CVE-2020-1472. At the time there were no documented attacks leveraging the...

Read More

5 min read

Should You Upgrade to iOS 14? Yup and Here's Why...

The IoT isn't the safest place, all-things-considered. Hacked cameras, hacked appliances, hacked video game consoles, and worst of all, hacked...

Read More

Video Presentation: Understanding the Threat Landscape

Last week Jay Smith gave a wonderful presentation for the fine folks over at Collective 54. We thought you might want to watch! You can check out the...

Read More

1 min read

The ZeroLogon Exploit (CVE-2020-1472)

If you haven't installed Microsoft's August patch updates for your Active Directory domain controllers, you might want to reconsider. A brand new...

Read More

3 min read

More Sneaky Covid-19 Attacks...

The Covid-19 Pandemic has raised some interesting challenges.  People around the world have had to make do when it comes to rapid change. That...

Read More

3 min read

Review: The Life and Times of Cybersecurity Professionals 2020

2020...what year...and it's not even over yet! There's still plenty of time for awful stuff to happen to us all! I, for one, am rooting for a giant...

Read More

Let's talk Cybersecurity!

Interested in better understanding the threat landscape? Want to know how you can better protect yourself? If you do, you're in luck!

Read More

2 min read

Vishing Attacks on the Rise

The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have issued a statement regarding an uptick in Vishing Attacks since the...

Read More

4 min read

The 7 Steps of a Successful Risk Assessment

There’s been a lot of talk about standards and compliance (ISO 27001 and GDPR to name a few). We’ve been talking about these standards quite a bit...

Read More

5 min read

ISO 27001: The Compliance Chameleon

Executive Summary: ISO 27001 is the only internationally-accepted and recognized information security standard in existence. It can be implemented in...

Read More

2 min read

How can ISO 27001 Help Your Business?

Drafted by the International Organization for Standardization, ISO 27001 is designed specifically to help build an information security management...

Read More

2 min read

Patch Tuesday Special Edition: SIGRed

(This article's a bit late as I was on vacation last week, so if you've already patched your Windows Server with the bug fixes released on July 14th...

Read More

2 min read

Ragnar Locker: What to Look Out For

It would seem the people who create and name malware/ransomware/etc. have the same affinity for pop culture references that I do. I predict that one...

Read More

5 min read

What is Phishing?

You’re being attacked. I know. Shocking. You might not believe it but it’s true. I’m getting attacked. You’re getting attacked. We’re all getting...

Read More

5 min read

Meet Valak: The Marquis of Malware

 

I'm not sure if you're a horror fan, or if you like spooky stuff. Hey, maybe you are, if you're reading this you work in cybersecurity and there's...

Read More

6 min read

RIP: My Cousin Alan Has Died - How to Spot a Social Engineering Attack

My cousin, Alan, has died.

He has ceased to be, bereft of life, he rests in peace, he has kicked the bucket, hopped the twig, bit the dust, snuffed...

Read More

1 min read

$500 to the Charity of Your Choice...

We've got a webinar coming up. I know, you've probably been inundated with requests to join webinars since this whole COVID-19 Pandemic started.

Read More

2 min read

The State of Cybersecurity: Pandemic Edition

About a week ago I got a call from a phone number I didn't recognize. It was a Massachusetts number from out around Springfield. I've got family out...

Read More

3 min read

Covid-19: An Update on Public Schools

 
If you've been following along with the blog, you're probably aware of the work we've been doing with HB 1612/RSA 189:66. It's a bit of privacy...
Read More

4 min read

An Ode to VPNs: Why Traditional Solutions Stink & Three Replacements

If you've ever had to connect remotely over Virtual Private Network (VPN) for work, you're missing out. Dante's Inferno would have included VPNs, had...

Read More

2 min read

Hey Zoom Users! Here are 7 Ways to Avoid a Zoombombing!

 

 A new, and disgusting trend has reared its ugly head: Zoombombing. Zoombombing is when an online troll enters a Zoom video conferencing meeting...

Read More

1 min read

Scammers Leveraging Covid-19 Confusion to Take Advantage of People

Scammers are legitimately trying to take advantage of people online during the Covid-19 crisis.

Read More

6 min read

7 Ways to Work from Home Productively

I assume many of you reading this are like me. You're working from home in the shadow of an international pandemic. 43 million Americans, coast to...

Read More

1 min read

Covid-19: Security7 Networks Update

Security7/Covid-19 Related News:

We wanted to take a minute and let you know how Security7 Networks plans to operate in regards to the Covid-19...

Read More

7 min read

Covid-19: How to Stay Healthy

This isn't the type of article I ever thought I'd be posting here on the Security7 Networks blog. We talk about computer viruses, the digital kind,...

Read More

1 min read

CVE-2020-0688: Patch Your Exchange Server(s)

Just when you thought Coronavirus was all you had to worry about, there's a new Microsoft Exchange Server exploit!

Read More

2 min read

Facial Recognition Company Clearview AI was Hacked

Facial recognition technology is pretty groovy stuff. It allows the software to scan a face (via things like a picture or video) and compare that...

Read More

1 min read

Oo De Lally! RobinHood Ransomware Returns...

This version of RobinHood doesn't steal from the rich and give to the poor. He just ruins your day. If you don't believe me just ask the City of...

Read More

1 min read

1 in 10 Macs infected by Shlayer Trojan...

 

While I would never personally recommend a Kaspersky product to save my life, you know, because they're believed to spy on people for the...

Read More

4 min read

URGENT: Microsoft Announces Critical Vulnerabilities in Windows Operating System

The Department of Homeland Security and Microsoft have made an announcement regarding some very serious CVEs that severely compromise the Windows...

Read More

4 min read

Should You Be Worried About Iran?

As tensions rise in the Middle East, it's increasingly likely some American businesses/agencies will be faced with cybersecurity attacks from the...

Read More

3 min read

What is a Managed Cybersecurity Services Provider?

We talk a lot about being a Managed Cybersecurity Services Provider and I thought it'd be a good idea to dive into exactly what a Managed...

Read More

5 min read

What is a Social Engineering Attack?

I wanted to take a moment to dive into something called “Social Engineering."

Parts of what I bring up is going to sound a bit familiar. There’s...

Read More

4 min read

Beware the Dark Web: 7 Ways to Avoid Leaked Credentials...

My email address was leaked on the dark web. I know, I know. I'm not thrilled about it. See, we run scans looking for leaked credentials on the dark...

Read More

Upcoming Webinar: November 21st, 12 p.m. - Idaptive

Security7 Networks will be joined by Brian Krause from Idaptive on November 21st to at 12 p.m. to give you a top down look at the world of Identity...

Read More

3 min read

UPDATED: Why SMBs and SMEs Should Consider Hiring an MSSP

This article was originally published on September 18th, 2018. It has been updated and expanded on.

For years a company's cybersecurity needs were...

Read More

1 min read

Watch out for E-Skimming Schemes this Holiday Season

The silly season is almost upon us. Mobs will soon lining up for a chance to fight each other to the death for the season's hottest item at your...

Read More

Is the Standard Cybersecurity Model Fundamentally Broken?

Tony Bradley over at Forbes.com seems to think so... and if I'm being perfectly honest, he might be right.

Read More

2 min read

Don't Hide. Talk Successfully to Your Employees About Cybersecurity Issues

The biggest threat (at least in my opinion) to an enterprise's cybersecurity health is the people that work there. That's not a knock on anybody,...

Read More

2 min read

Ransomware Statistics in 2019 So Far...

I've written about Ransomware attacks extremely often this year. I feel like a fear-monger or one of those sidewalk preachers who loudly claim the...

Read More

2 min read

Introducing Lord EK & Why Exploit Kits are Bad News

There's a new kid on the block. Its name is Lord EK and it could potentially (along with all the other Exploit Kits out there) cause people grief if...

Read More

2 min read

The DealerLeads Breach: What You Need to Know...

198 million people who were looking for a new car just had their PII data stolen by hackers. The breached database belonged to DealerLeads, an online...

Read More

1 min read

BlueKeep Exploit Publicly Released by Rapid7. Better Start Patching...

At the end of July I wrote an article about Immunity's working BlueKeep (CVE-2019-0708) exploit, a vulnerability that can wreck havoc on a Windows...

Read More

1 min read

Facebook Security Lapse Exposes Millions of Phone Numbers...

We've said it before and we'll say it again: you really shouldn't be using Facebook. You can read what we've had to say in the past here (as well as...

Read More

1 min read

Hackers Have Been Spying on iPhones for Years

 
Google's Project Zero announced some big news last Thursday: hackers have been using "Watering Hole" style attacks for years to spy on iPhones...
Read More

1 min read

Ransomware Rocks Dentist Offices Around the Country

 

If going to the dentist wasn't painful enough...

Read More

Imperva Breached: What You Need to Know

One of the world's leading providers of Internet firewall services, has been breached. Imperva announced yesterday that a 2017 database, made up of...

Read More

2 min read

Edge Computing: Why Computing on the Edge Makes Sense for the Healthcare Industry

If you're new to our series regarding Edge Computing I suggest you check out this article first - Edge Computing: Why Rising Above the Cloud Might be...

Read More

1 min read

It's Groundhog Day, Again: 22 Texas Towns Hit With Ransomware

Towns across the country are getting whammied by Malware on a regular basis. It's honestly like the movie Groundhog Day. The same story, over and...

Read More

1 min read

Hiding in Plain Site: 20 Year Old Windows Exploit Patched...

In the words of the immortal Charlie Brown; good grief.

Read More

1 min read

Watch out for Password Spraying Attacks...

The Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning to Network Administrators...

Read More

5 min read

7 Steps a Municipality Can Take to Avoid Cyber Attacks

You've heard the story before; a small town, held hostage by a strange, foreign, invading force. It's only hope lies in a rag tag band...

Read More

1 min read

Cloudflare Bounces 8Chan in Wake of Mass Shootings

Cloudflare is a favorite of ours. We like their style. Cloudflare is very transparent with their decision making processes and we appreciate that...

Read More

2 min read

Hacker Compromises 100 Million Capital One Customer Records

A hacker in Seattle, Washington allegedly broke into Capital One Bank's servers and compromised over 100,000,000 customer records.

Read More

2 min read

Working BlueKeep Exploit Announced - Are You Patched?

Immunity, a cybersecurity contracting company based out of Miami, Florida has announced a working exploit for the dreaded BlueKeep vulnerability. But...

Read More

3 min read

Is FaceApp Really a Security Threat?

FaceApp! It's the newest thing! It's all the rage! You can make your parents young! You can make your children old! It doesn't work on dogs yet but...

Read More

1 min read

NSO Group's Pegasus Software Snoops on iOS Without Being Noticed

This is some spooky stuff.

The Financial Times is reporting that Israeli firm NSO Group has developed software that can not only collect data from an...

Read More

3 min read

The NEW Cylance Vulnerability: What You Need to Know

Skylight Cyber recently announced they'd found a pretty major vulnerability in CylancePROTECT that allows for Malware to trick the program's software...

Read More

K12 Inc. Breached - Were Your Students Affected?

If your school uses the A+nyWhere Learning System from K12 Inc, there's a good chance your student's PII data was exposed between June 23 and July 1.

Read More

1 min read

BeiTaAd - New Malicious Adware Discovered on Android

The Android ecosystem is a scary, scary place. Where Apple's iOS App Store is a walled, curated and highly regulated walled garden, Google's Play...

Read More

1 min read

British Airways Fined £183 Million in GDPR Breach...

Last year British Airlines got hacked. 380,000 customers had their data exposed. The criminal group Magecart claimed responsibility. That's old news...

Read More

3 min read

Edge Computing: The Brains Retail Needs to Survive in the IoT Era...

The world of physical retail has changed a lot. The entire shopping experience has changed, top to bottom. The only way retailers have managed to...

Read More

4 min read

If You're Going to Use Public Wi-Fi Please Make Smart Choices...

We live in an very, very connected world. We're about two shakes away from getting signals beamed directly into our brains. But, since that terrible...

Read More

4 min read

Edge Computing: Why Rising Above the Cloud Might be a Better Option for Your Business

We've long held the opinion that many companies are moving solely to the cloud because it's en-vogue, not because it's necessarily cost-effective or...

Read More

1 min read

Upcoming Webinar: FortiNAC with Scott Dunbar

We just wanted to let everybody know about a webinar we're hosting with our sister site e-Armor.net. We'll be talking with Scott Dunbar from ...

Read More

3 min read

Zero-Trust Architecture: What is it and why should you care?

 
If you're like most people, the thought of your sensitive business data being stolen by some creep (that probably spends their entire day in...
Read More

5 min read

Kentucky School District Recovers $3.7 Million Stolen During Phishing Scam*

Some good news for a change. A Kentucky School who lost $3.7 million in a Phishing attack was able to get it back.

Read More

City of Tallahassee Payroll Hacked - Thieves Steal $498,000

It's a tale as old as time. A municipality falls victim to a Hacker and loses a huge chunk of change. This time it's the City of Tallahassee,...

Read More

3 min read

Credential Stuffing Scheme Hits Chipolte Web Users Right Where it Hurts...

Right in their wallets! What'd you think I was going to say? Sheesh.

Read More

1 min read

Careful What You Say Alexa...Amazon May be Listening...

Yep...you heard that right.

Read More

1 min read

April Fools! City of Albany NY Attacked by Ransomware

Talk about an April Fools Day joke for the City of Albany, NY!

Read More

2 min read

Norsk Hydro LockerGoga Update

I wrote a bit last week about Norsk Hydro's encounter with LockerGoga, a newish form of Ransomware.

DarkReading.com has posted an insightful look at...

Read More

1 min read

Facebook Stored User Account Passwords in Plain Text File FOR YEARS

I'm going to be blunt: if you're still using Facebook you should probably have your head examined. They're absolutely reckless when it comes to their...

Read More

4 min read

Hackers: Black Hats, Gray Hats, White Hats, Oh My!

It's funny sometimes how we categorize things. As a species that is. It's a quirk of ours. We're the only animals on the planet that does it.

Read More

1 min read

Norsk Hyrdo Hit by LockerGoga Ransomware

Norsk Hydro, one of the world's largest aluminum producers in the world and an electricity utility in Norway, has been hit by ransomware.

Read More

2 min read

Jackson County, GA Pays Cybercriminals $400,000 to Unlock Computers After Ransomware Attack.

Another municipality in the State of Georgia has become the victim of a crippling cyber attack.

Read More

Scammers are Using Cheap Domains to Commit Nefarious Deeds...

Our partners at Zscaler have posted a blog regarding Scammers and a strategy they've been leveraging lately that involves domain squatting and bulk...

Read More

1 min read

FYI: The Astaroth Trojan Part II

Cybereason has released an update regarding the recent re-emergence of the Astaroth Trojan. You can read it here

Read More

1 min read

MITRE Evaluates Cybereason Defense Platform

Our friends over at Cybereason have posted a great overview of the recent MITRE evaluation of their defense platform.

Read More

1 min read

MacOS Exploit Targets Saved Keychain Passwords

A recently discovered MacOS exploit allows someone to steal usernames and passwords directly from the Keychain app with out requiring an...

Read More

1 min read

FYI: The Astaroth Trojan

You might of heard recently that the Astaroth Trojan is making a comeback. We break down what it is, why it's making a comeback and more...

Read More

3 min read

Why Small to Medium Sized Businesses & Enterprises Need to Consider Hiring an MSSP

For years a company's cybersecurity needs were left up to their IT Department. IT was responsible for every decision, every purchase. The C-Suite and...

Read More

2 min read

What is Host Identity Protocol (HIP)?

The other day a few of my colleagues and I went to a local Sysadmins and Networking meetup hosted by SEA-TUG.

The topic of the night was Host...

Read More

2 min read

Introducing Security Advisory Services.

What are Security Advisory Services?

Security7 Network's Security Advisory Services (SAS) provides small to medium-sized businesses and enterprises...

Read More

2 min read

Introducing Darrin Maggy, our NEW Practice Manager

The security threat landscape keeps changing and Security7 Networks changes right along with it. Every day brings unique challenges and threats to...

Read More

3 min read

New Hampshire: It's Time to Talk about HB 1612

If people working in the education space thought they were immune to the risk of cyberattack, think again: Educators across the country were welcomed...

Read More

1 min read

New USB-C Authentication Program Seems Promising

If you're a Mac user, like most of us at the Security7 office are, you're already using USB-C in some form. It was a tough switch. There...

Read More

2 min read

Sometimes Life Can be a Real Beach: Hackers Steal $800,000 from Cape Cod Community College

I guess it's not all fun in the sun down on the Cape. Hackers just stole $800,000 from Cape Cod Community College via a phishing attack and some...

Read More

Watch our SD-WAN Webinar!

Today we hosted (via e-Armor.net) a webinar with Fortinet! It was about their secure SD-WAN offering and it turned out really, really well. We...

Read More

Cybercrime Trends for the Financial Industry

Great article from Global Banking and Finance Review detailing the latest cybercrime trends for the Financial industry.

Read More

1 min read

Was Amazon.com breached? Yes, but not by hackers...

There's a rumor going around that some Amazon customers have been getting emails from the retail giant saying some of their information (the email...

Read More

Russian Hackers at it Again: Post Election Edition

Looks like the Russians are up to something...again. This time it looks like they've launched a phishing campaign against the U.S. State Department.

Read More

5 Ransomware Trends Every Business Should Know

Head over to MSSPAlert.com and check out their latest article regarding ransomware and the five trends you should watch out for when trying to...

Read More

Cylance Pro Tip: How to Avoid a SAM SAM Ransomware Attack

Cylance has a great article regarding how you can avoid a SAM SAM Ransomware attack. It's definitely worth a read. Check it out over at their blog: ...

Read More

Cybereason: How to Mature as a CISO

 

We've been on a kick lately where we've been stressing how important it is to discuss cybersecurity in the C-suite. Our friends at Cybereason have...

Read More

2 min read

How a Cybersecurity Risk Scorecard Can Help your Business Stay Safe

There's a litany of things a business owner has to be concerned with. There's so much to deal with on a daily basis that certain things can get...

Read More

What is Betabot? Cybereason explains...

The great researchers over at Cybereason have compiled a great repository of information regarding Betabot, a relatively new malware designed to...

Read More

Quick Tips: How to Avoid Being Taken Advantage of Online

Our friends at Fortinet have posted a great article on CSO Online that details a few quick steps you can take to avoid being taken advantage of...

Read More

How Artificial Intelligence can be Leveraged for Good and Bad

A great article from ThreatPost.com that talks about how Artificial Intelligence can be leveraged for both good and bad in regards to cybersecurity.

Read More

1 min read

Centrify to Spin Off IDaaS Business - Creates Idaptive

Big news in the Identity-as-a-Service (IDaaS) world. Centrify has decided to spin off their IDaaS service as a brand new company called Idaptive....

Read More

Cyber Hygiene Best Practices

A great article from the fine folk over at Fortinet (via CSOonline.com) regarding cyber hygiene best practices.
Read More

Election Hacking is About More than Just Voting Booths

Our great friends over at Cybereason have written an excellent article on the multiple ways an election for public office can be hacked. The article...

Read More

3 min read

Why the Cybersecurity Discussion Needs to Happen in the Boardroom

 

It is becoming more and more critical for a business to have a good, strong cybersecurity strategy. With the number of cyber attacks and...

Read More
1 2