• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Technologous - Managed IT Solutions Bryan/College Station

  • Home
  • About
    • Areas We Serve
    • Our Leadership
      • Chris Dawson
      • Ian Soares
  • IT Services
    • Consulting
    • Managed IT
    • Support IT
    • Cloud IT
  • Blog
  • Request a Consultation
  • Contact

Hackers

Update VMWare Software Immediately To Avoid Possible Attack

Update VMWare Software Immediately To Avoid Possible Attack

Update VMWare Software Immediately To Avoid Possible Attack. The US Cybersecurity and Infrastructure Security Agency recently issued a warning to all companies running VMware Vcenter Server and VMware Cloud Foundation. They ask them to download and apply the latest security patches as soon as possible because attackers are actively hunting for … [Read more...] about Update VMWare Software Immediately To Avoid Possible Attack

June 19, 2021 Filed Under: Blog Tagged With: Hackers, Security Flaws, US Cybersecurity and Infrastructure Security Agency, VMware

New Subscription Billing Notification Could Be A Phishing Attack

New Subscription Billing Notification Could Be A Phishing Attack, and you should alert your employees right away. A growing trend in the hacking world is to use mixed media, including phone calls with live actors at the other end, posing as "customer support" representatives, and even recorded messages including instructions and attached emails luring unsuspecting recipients to download malicious files. In this case, the attack goes as follows: A potential victim will get an email informing them that they're subscribing to a fee-based service. The email instructs them to call a given phone number and speak with a representative who will be happy to help them. If the recipient calls, the agent, who, of course, is part of the hacker's organization, will guide the caller to a website where they can download a file the faux agent claims is necessary to finalize the cancellation. Naturally, the file does no such thing and is instead a piece of malware of the attacker's choosing. The payload can vary and be just about anything. The currently identified campaign uses BazaLoader, which creates a persistent backdoor on Windows-based machines to give the attackers easy access to that device that they can exploit in various ways later on. While this may seem like a convoluted path for the attackers to take, it can be devastatingly effective. From the attackers' point of view, it has the key advantage of being extremely difficult to detect and prevent. Most detection routines are file-based, and since this type of email doesn't contain an attachment of any kind, it poses tremendous challenges for IT security professionals. As ever, the best defense is education and mindfulness, so be sure your staff is aware.

New Subscription Billing Notification Could Be A Phishing Attack, and you should alert your employees right away. A growing trend in the hacking world is to use mixed media, including phone calls with live actors at the other end, posing as "customer support" representatives, and even recorded messages including instructions and attached emails … [Read more...] about New Subscription Billing Notification Could Be A Phishing Attack

June 15, 2021 Filed Under: Blog Tagged With: Hackers, Phishing, phishing scam

RevengeRAT Trojan Gives Hackers Access To Your Data

New RevengeRAT Trojan Gives Hackers Access To Your Data

RevengeRAT Trojan Gives Hackers Access To Your Data. Recently, Microsoft issued an alert warning users about a remote access tool called RevengeRAT, also known as AsyncRAT. It targets travel and aerospace companies with spear-phishing emails. The emails use social engineering tricks to prompt employees at these types of firms to open a poisoned … [Read more...] about RevengeRAT Trojan Gives Hackers Access To Your Data

June 2, 2021 Filed Under: Blog Tagged With: Hackers, Morphisec, RevengeRat

Hackers Use TLS to Hide Activities

Hackers Use TLS to Hide Activities

Hackers Use TLS to Hide Activities since Google made some important changes to their Chrome browser to increase user security. Among these changes was for the browser to default to "HTTPS" reducing the number of "man in the middle" and similar types of attacks. Their strategy worked. Other companies adopted Google's approach, and HTTPS … [Read more...] about Hackers Use TLS to Hide Activities

May 8, 2021 Filed Under: Blog Tagged With: Hackers, TLS, Transport Layer Security

FickerStealer Malware Tricks People and Steals Their Data

FickerStealer Malware Tricks People and Steals Their Data

FickerStealer Malware Tricks People and Steals Their Data. Jiri Kropac, the head of ESET's Threat Detection Labs, reports of a new malware campaign to be aware of. This one is a bit different in terms of methodology. Hackers most commonly employ emails utilizing various social engineering tricks to lure unsuspecting recipients into clicking … [Read more...] about FickerStealer Malware Tricks People and Steals Their Data

May 7, 2021 Filed Under: Blog Tagged With: Flicker Malware, FlickerStealer, Hackers, spotify

Hackers Guess Your Passwords Easier Than You Thought

Hackers Guess Your Passwords Easier Than You Thought

Hackers Guess Your Passwords Easier Than You Thought. Password security has long been a thorn in the side of IT Security Professionals. It's easy enough to understand why. Passwords are inconvenient from the perspective of users, which is why they tend to keep them as simple as possible so that they can remember them. On the other hand, IT Security … [Read more...] about Hackers Guess Your Passwords Easier Than You Thought

May 5, 2021 Filed Under: Blog Tagged With: Hackers, Passwords

« Previous Page
Next Page »

Primary Sidebar

Contact Us



GET OUR BLOG IN YOUR EMAIL!

Archives

  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • April 2020
  • March 2020
  • February 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • August 2018

Tags

adobe android App Apple attack Attacks Breach Browser Chrome Dark Web Data Database Data Breach Email Facebook Firefox gmail Google Google Chrome government hacker Hackers information iOS iPhone malware Microsoft Microsoft edge Microsoft Windows 10 office 365 pandemic Password Passwords patch Phishing Phishing emails ransomeware Ransomware security Update Vulnerability Wifi Windows Windows 7 Windows 10

Footer

Contact Us

Address: 3091 University Drive, Unit 210, Bryan, Texas 77802
Phone: 979-217-1226

Our Blog

  • BazarBackdoor Uses Compressed Files To Deliver Malware July 24, 2021
  • Morgan Stanley Banking Hit By Data Breach July 23, 2021
  • Microsoft has Patches For PrintNightmare Bug July 22, 2021
  • Ransomware Attackers May Target Industrial Machines Soon July 21, 2021
  • Google Calendar Adds Virtual Meeting For Hybrid Office Workers July 20, 2021

Search

  • Home
  • About
  • Resources
  • Contact
  • Our Leadership
  • Why Choose Us?
  • IT Services
  • Request a Consultation

Copyright © 2023| All Rights Reserved | Powered By Technologous, LLC | Log in