Networking News
Liquid Video Technologies, Inc. is here to help you. Not understanding the services we provide or need more information on other matters? These blog posts are here to help you and keep you up-to-date.
Vulnerabilities Most Exploited by Hackers 2021
Intelligence agencies in Australia, the U.K., and the U.S. issued a joint advisory on Wednesday detailing the most exploited vulnerabilities in 2020 and 2021, once again demonstrating how threat actors are able to swiftly weaponize publically disclosed flaws to their...
MosaicLoader Hides Itself Among Defender
Cybersecurity researchers lifted the lid on a previously undocumented malware strain dubbed, "MosaicLoader" that singles out individuals searching for cracked software as a part of a global campaign. The malware strain installs a Windows utility on infected systems to...
End-User Password Change Frustrations
Organizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. One key factor is the password policy. This post discusses problems with end-user password change requests and...
NPM Package – Stealing Users’ Passwords
A software package available from the official NPM repository has been revealed to be actually a front for a tool that's designed to steal saved passwords from the Chrome web browser. It demonstrated this ability by automatically prompting the user to reset their...
Critical Password Security Rules 2021
Password security was a problem even before the advent of widespread remote work. So, what happened post-pandemic? We developed new and creative approaches to password security that will help you safeguard your accounts. We also created five critical password security...
Zero-Day Flaws Exploited Recently in the Wild
Threat intelligence researchers from Google on Wednesday shed more light on four in the wild zero-day flaws in Chrome, Safari, and Internet Explorer browsers that were exploited by malicious actors in different campaigns since the start of the year. The four flaws...
Trickbot Malware Returns to Spy on its Victims
Cybersecurity researchers have opened the lid on the continued resurgence of the insidious Trickbot malware, making it clear that the Russian-based transnational cybercrime group is working behind the scenes to revamp its attack infrastructure in response to recent...
Magecart Hackers Hide Stolen Data In Images
Cybercrime actors part of the Magecart group have latched on to a new technique of obfuscating the malware code within comment blocks and encoding stolen credit card data into images and other files hosted on the server, once again demonstrating how the attackers are...
Macro Security Warnings Disabled by Hackers
While it's a norm for phishing campaigns that distribute weaponized Microsoft Office documents to prompt users to enable macros in order to directly trigger the infection chain, recent findings now show attackers are using non-malicious documents to disable security...
WildPressure APT – New Malware Emerges
A malicious campaign that set its sights on industrial-related entities in the Middle East since 2019 has surfaced with an upgraded malware toolset, called WildPressure, to strike both Windows and macOS operating systems, symbolizing expansion in both its targets and...
API-First Era – Rethink Application Security
Securing applications it the API-first era can be an uphill battle. As development accelerates, accountability becomes unclear, and getting controls to operate becomes a challenge in itself. It's time that we rethink our application security strategies to reflect new...
Strengthen Your Ransomware Defenses
The recent influx of ransomware attacks has brought to life fears of downtime and data loss cybersecurity pros have warned about, as attacks on the energy sector, food supply chain, healthcare industry, and other critical infrastructure have grabbed headlines. The...
Data Leaked 269 GB From Police Data Center
A group of hacktivists and activists have published 269 GB of data leaked and allegedly stolen from more than 200 police departments, fusion centers and other law enforcement agencies across the United States. This includes the login credentials for 32 police domains....
Cyber-Attack Groups In Ransomware Web
Organizations today are overwhelmed by the number of dangers and threats to look out for. From span to phishing attempts to new infiltrating and ransomware tactics. This research investigates methods that are currently being employed by cyber groups to generate...
Liquid Video Technologies –
Solutions to Fit Your Budget
Liquid Video Technologies offers solutions that are designed to secure your investment in people, equipment, inventory, and eliminate potential frivolous claims. Whether you need to secure a business location or your home, Liquid Video Technologies has a solution to fit your budget. If you need any additional information or would like to speak with one of our Security Specialists, please call (864) 859-9848 or email us at info@liquidvideotechnologies.com
Recent Comments