Guidance on Defending Against Video Teleconferencing (VTC) Hijacking and Zoom-bombing

The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).

Read More

Advisory On RDP Brute Force Attacks

A way for employees to access corporate devices is by using Remote Desktop Protocol (RDP). Remote Desktop is a remote management tool which allows you to connect to any computer and take over the desktop.

Read More

Alert Regarding Vulnerability (CVE-2019-19781) in Citrix Products

CERT-GH confirmed that information including Proof-of-Concept code about a vulnerability (CVE-2019-19781) in Citrix Application Delivery Controller and Citrix Gateway has been made public. A remote attacker leveraging this vulnerability may execute arbitrary code.

Read More

Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers.

Read More

Website Defacement

Website defacement is an attack on a website that changes the visual appearance of the site or webpage. It is similar to drawing graffiti on a wall, only it happens virtually as a kind of electronic graffiti and is a form of vandalism.

Read More

How to identify malware on your phone

When a smartphone is infected with malware, it can cause several problems, including allowing hackers to steal private information from the victim.

Read More