Google Pixel – Lock Screen Hack

Security Researcher, David Schütz, found a way to bypass the Google Pixel lock screen.  The researcher was able to use their own SIM card to bypass the lock screen. Once they inserted their pin-locked sim card, they were able to bypass the lock screen using their pin and gain access …

Read More

Azov Ransomware

Azov ransomware was originally thought to be yet another ransomware that encrypts a victim’s data, demands a ransom, and forces you to pay if you want your data back. All this, however, is just a front. This is a new type of ransomware. Instead of providing you the contact information …

Read More

What is a Honeypot?

The ever-expanding world of technology is growing bigger every day. With that comes a myriad of vulnerable and insecure computer systems that have been neglected. This presents a massive problem, as these uncared-for systems are goldmines for cybercriminals to access. With this malicious access comes data leaks, stolen credentials, and …

Read More

New iPhone Feature – Lockdown Mode for Security

Here’s what Lockdown Mode on your iPhone does:

Message Attachments are blocked, except for images.

If a website has a complex tech, like just-in-time (JIT) Javascript compilation, it will be disabled.

FaceTime calls, and other incoming invitations and service requests, from unknown callers are blocked.

LAUSD Hit With Ransomware Attack Over Holiday Weekend

LAUSD hit with ransomware attack

Over the Labor Day weekend, one of the United States’ largest school districts was hit by a cyberattack. LAUSD serves more than 600,000 students, between kindergarten and 12th grade, and employs more than 26,000 teachers at over 1,000 schools.

Supply Chain Security Attack

supply-chain-security

IconBurst: NPM software supply chain attack grabs data from apps, websites   ReversingLabs researchers recently discovered evidence of a widespread software supply chain Iconburst attack involving malicious Javascript packages offered via the NPM package manager. Researchers at ReversingLabs identified more than two dozen NPM packages, dating back six months, that …

Read More

Robert Half client accounts (Password Stuffing)

Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts   HR consulting firm Robert Half has started informing customers that their personal and financial information might have been compromised (password stuffing) after hackers targeted their RobertHalf.com accounts. Information provided by the company to the Maine Attorney General shows …

Read More

Spokane Residential Health District (Phishing)

Phishing

SRHD Apologizes and Commits to Corrective Actions   Spokane Regional Health District (SRHD) confirmed personal data may have been disclosed after the discovery of an unauthorized breach of personal health information via a phishing email, occurring on February 24, 2022.  

Microsoft issues warning on BEC phishing campaign 

phishing-campaign

From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud  A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA). The attackers …

Read More

SQL Injection

SQL-injection

What is SQL Injection? SQL Injection is a web security vulnerability that allows an attack to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other …

Read More