by Liquid Video Technologies | Dec 9, 2020 | Cybersecurity, Data Breaches, Malware, News, Security
Emotet is one of the most dangerous and widespread malware threats active today. Ever since its discovery in 2014—when Emotet was a standard credential stealer and banking Trojan, the malware has evolved into a modular, polymorphic platform for distributing other...
by Liquid Video Technologies | Dec 7, 2020 | Cybersecurity, Data Breaches, Security
In April 2014, the Heartbleed vulnerability hit the internet by surprise. Heartbleed was the name given to the CVE-2014-0160, which was a simple to exploit in Open SSL that allow attackers to view cryptographic keys, login credentials and other private data. Open SSL...
by Liquid Video Technologies | Dec 4, 2020 | Cybersecurity, News
As institutions of higher education reel from recent cyberattacks in the United Kingdom, IT departments work tirelessly to secure sensitive student data. Student records offer a wealth of personally identifiable information (PII) from birth dates and social security...
by Liquid Video Technologies | Dec 2, 2020 | Cybersecurity, Data Breaches, News, Security, Security Breach
Cybersecurity researchers today unveiled a complex and targeted espionage attack on potential government sector victims in South East Asia that they believe was carried out by a sophisticated Chinese APT group at least since 2018. “The attack has a complex and...
by Liquid Video Technologies | Nov 30, 2020 | Cybersecurity, Security
Generally, the chief information security officer (CISO) is thought of as the top executive responsible for information security within organizations. However, in today’s remote work environment, the need to expand security beyond one department or the...
by Liquid Video Technologies | Nov 27, 2020 | Cybersecurity, Data Breaches, Network Security, Security, Security Breach
The term “best practice” often comes up in tandem with “cyber hygiene.” At the Center for Internet Security (CIS), we’ve taken our best shot at a specific definition for basic cyber hygiene, based on CIS Controls Implementation Group 1. But I thought I would share...
Recent Comments