Cybersecurity Threats

Recovering Hacked Website

Recovering Hacked Website

Recover hacked website is a common term in Cyber security. Websites can be hacked because of multiple reasons. Some of the most common reasons that we’ve seen are account compromise, insecure plugins, non-restrictive file permissions. We’ve secured these weaknesses through simple steps such as implementing two factor authentication, updating old software, cleaning up malware and …

Recovering Hacked Website Read More »

Cybersecurity Threats


Log4j Vulnerability Explained Vulnerability The Log4j vulnerability allows malicious attackers to execute code remotely on any targeted computer. What is Log4j: Log4j an open source software, a logging library for Java, is widely used by businesses and web portals. Earlier this month, this open source software was in the news for its vulnerabilities. Impact Being …

Log4j Read More »

SQL Injection

SQL Injection

What is SQL Injection? SQL Injection is a web security vulnerability that allows an attack to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data …

SQL Injection Read More »

BEC phishing campaign 

Microsoft issues warning on BEC phishing campaign 

From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud  A large-scale phishing campaign that used adversary-in-the-middle (AiTM) phishing sites stole passwords, hijacked a user’s sign-in session, and skipped the authentication process even if the user had enabled multifactor authentication (MFA). The attackers then used the stolen credentials …

Microsoft issues warning on BEC phishing campaign  Read More »


Spokane Residential Health District (Phishing)

SRHD Apologizes and Commits to Corrective Actions Spokane Regional Health District (SRHD) confirmed personal data may have been disclosed after the discovery of an unauthorized breach of personal health information via a phishing email, occurring on February 24, 2022.

Password Stuffing

Robert Half client accounts (Password Stuffing)

Staffing Firm Robert Half Says Hackers Targeted Over 1,000 Customer Accounts   HR consulting firm Robert Half has started informing customers that their personal and financial information might have been compromised (password stuffing) after hackers targeted their accounts. Information provided by the company to the Maine Attorney General shows that threat actors targeted Robert …

Robert Half client accounts (Password Stuffing) Read More »


IconBurst attack grabs data from multiple web apps (Supply Chain attack)

IconBurst: NPM software supply chain attack grabs data from apps, websites ReversingLabs researchers recently discovered evidence of a widespread software supply chain Iconburst attack involving malicious Javascript packages offered via the NPM package manager. Researchers at ReversingLabs identified more than two dozen NPM packages, dating back six months, that contain obfuscated Javascript designed to steal …

IconBurst attack grabs data from multiple web apps (Supply Chain attack) Read More »

LAUSD hit with ransomware attack

LAUSD Hit With Ransomware Attack Over Holiday Weekend

Over the Labor Day weekend, one of the United States’ largest school districts was hit by a cyberattack. LAUSD serves more than 600,000 students, between kindergarten and 12th grade, and employs more than 26,000 teachers at over 1,000 schools.

iPhone iOS 16 lockdown mode

New iPhone Feature – Lockdown Mode for Security

Here’s what Lockdown Mode on your iPhone does:

Message Attachments are blocked, except for images.

If a website has a complex tech, like just-in-time (JIT) Javascript compilation, it will be disabled.

FaceTime calls, and other incoming invitations and service requests, from unknown callers are blocked.