Guidance on Defending Against Video Teleconferencing (VTC) Hijacking and Zoom-bombing

The Federal Bureau of Investigation (FBI) has released an article on defending against video-teleconferencing (VTC) hijacking (referred to as “Zoom-bombing” when attacks are to the Zoom VTC platform).

Read More

Smartphone or Tablet Hacked

If you use public Wi-Fi or USB power charging stations at airports, hotels, and other locations, make sure to use a VPN when using public Wi-Fi, and always make sure to use a USB data blocker...

Read More

Website Defacement

CWebsite defacement is an attack on a website that changes the visual appearance of the site or webpage. It is similar to drawing graffiti on a wall, only it happens virtually as a kind of electronic graffiti and is a form of vandalism.

Read More

Advisory On RDP Brute Force Attacks

A way for employees to access corporate devices is by using Remote Desktop Protocol (RDP). Remote Desktop is a remote management tool which allows you to connect to any computer and take over the desktop.

Read More

Alert Regarding Vulnerability (CVE-2019-19781) in Citrix Products

CERT-GH confirmed that information including Proof-of-Concept code about a vulnerability (CVE-2019-19781) in Citrix Application Delivery Controller and Citrix Gateway has been made public. A remote attacker leveraging this vulnerability may execute arbitrary code.

Read More

Avoid Phishing Scams

Scammers use email or text messages to trick you into giving them your personal information. They may try to steal your passwords, account numbers, or Social Security numbers.

Read More

ZOOM PHISING ATTACKS

Individuals and businesses have become increasingly reliant on video conferencing to stay connected during the Covid-19 outbreak, hence working from home. Organizations have adapted having online meetings and webinars with the use of platforms such as Cisco WebEx, Microsoft Teams, Slack and Zoom.

Read More