Guidance on Defending Against Video Teleconferencing (VTC) Hijacking and Zoom-bombing

The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).

Read More

Smartphone or Tablet Hacked

If you use public Wi-Fi or USB power charging stations at airports, hotels, and other locations, make sure to use a VPN when using public Wi-Fi, and always make sure to use a USB data blocker...

Read More

Website Defacement

CWebsite defacement is an attack on a website that changes the visual appearance of the site or webpage. It is similar to drawing graffiti on a wall, only it happens virtually as a kind of electronic graffiti and is a form of vandalism.

Read More

Advisory On RDP Brute Force Attacks

A way for employees to access corporate devices is by using Remote Desktop Protocol (RDP). Remote Desktop is a remote management tool which allows you to connect to any computer and take over the desktop.

Read More

Alert Regarding Vulnerability (CVE-2019-19781) in Citrix Products

CERT-GH confirmed that information including Proof-of-Concept code about a vulnerability (CVE-2019-19781) in Citrix Application Delivery Controller and Citrix Gateway has been made public. A remote attacker leveraging this vulnerability may execute arbitrary code.

Read More

Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers.

Read More

ZOOM PHISING ATTACKS

Individuals and businesses have become increasingly reliant on video conferencing to stay connected during the Covid-19 outbreak, hence working from home. Organizations have adapted having online meetings and webinars with the use of platforms such as Cisco WebEx, Microsoft Teams, Slack and Zoom.

Read More

Risk of SharePoint vulnerability

The National Cyber Security Centre (NCSC) is raising awareness of a new remote code execution vulnerability (CVE-2020-16952) affecting Microsoft SharePoint. Successful exploitation of this vulnerability would allow an attacker to run arbitrary code and carry out security actions in the context of the local.

Read More

The Use of Supplement Passwords

Passwords are a good first layer of protection, but attackers can guess or intercept passwords. Additional security measures can protect you even if an attacker does obtain your password. You can strengthen that first layer of protection by avoiding passwords based on personal information; using the longest password or passphrase possible (8–64 characters); and not sharing your passwords with anyone else

Read More

Social Engineering and Phishing Attacks

Attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials.

Read More

SHADOW IT

Shadow IT is the use of information technology systems, devices, software, applications, and services by a department or individual without explicit IT department approval or knowledge within an organization.

Read More

SAFETY OF MOBILE DEVICES

Mobile devices have become a significant part of our life and their widespread use, has led to rapid growth in the development of businesses. Your mobile devices – including smartphones, laptops and tablets – are always within reach everywhere you go, whether for work, travel or entertainment

Read More

Reducing Spam

Spam is a common, and often frustrating, side effect to having an email account. Although you will probably not be able to eliminate it, there are ways to reduce it Spam is the electronic version of “junk mail.”Spam does not necessarily contain viruses—valid messages.

Read More

IMPERSONATION OF GOVERNMENT OFFICIALS

National Cyber Security Centre (NCSC) warns of online scams promoting fake job recruitment. Impersonation of government officials is a striking.

Read More

END-OF-SUPPORT SOFTWARE

On July 13, 2015, Microsoft officially shut off extended support for the wildly popular Windows 2003 Server operating system. On that day, it was estimated that as many as 9 million servers were about to lose .

Read More