1.978.662.2041 info@northeast-tech.com

Resources

A scam operation called “Estate” has attempted to trick nearly a hundred thousand people into handing over multi-factor authentication codes over the past year, according to Zack Whittaker at TechCrunch. ... Read more
Published on: 05-16-2024
Rapid7 reports an interesting social engineering scheme that easily bypasses content filtering defenses and creatively uses a fake help desk to supposedly “help” users put down the attack. ... Read more
Published on: 05-16-2024
New data shows that despite the massive evolution of the cybercrime economy, threat actors are sticking with the basics in social engineering attacks, with a goal at stealing data. ... Read more
Published on: 05-15-2024
The US Federal Bureau of Investigation’s (FBI’s) San Francisco division warns that threat actors are increasingly using AI tools to improve their social engineering attacks. ... Read more
Published on: 05-15-2024
Trend analysis of ransomware attacks in the first quarter of this year reveals a continual increase in the number of "unknown" initial attack vectors, and I think I might understand why. ... Read more
Published on: 05-14-2024
Attackers are exploiting Reflected Cross-Site Scripting (XSS) flaws to bypass security filters, according to a new report from Vipre. This technique allows attackers to send benign links in phishing emails that will redirect users to malicious sites. ... Read more
Published on: 05-14-2024
The Royal Canadian Mounted Police (RCMP) in Nova Scotia is warning of spear phishing attacks that impersonate company managers. The scammers text company employees requesting a payment to cover an urgent business need. ... Read more
Published on: 05-14-2024
New analysis of Q1’s ransomware attacks uncovers a single group responsible for the majority and discusses what makes them so successful. ... Read more
Published on: 05-14-2024
"Reality Hijacked" isn't just a title—it's a wake-up call. The advent and acceleration of GenAI is redefining our relationship with 'reality' and challenging our grip on the truth. ... Read more
Published on: 05-13-2024
Just when you think bad actors cannot sink any lower, they find a way to. In a recent chilling evolution of ransomware tactics, attackers are now also targeting the families of corporate executives to force compliance and payment.  ... Read more
Published on: 05-12-2024
Like most observers, I celebrated Google’s recent announcement on April 9th about new multi-party approvals for a handful or so of common actions accomplished by super admins in Google Workspace. ... Read more
Published on: 05-10-2024
New data shows organizations are improving their ability to detect and respond to ransomware attacks, but is it fast enough to make a difference and stop attacks? ... Read more
Published on: 05-10-2024
One of the largest phishing-as-a-service platforms, LabHost, was severely disrupted by law enforcement in 19 countries during a year-long operation that resulted in 37 arrests. ... Read more
Published on: 05-10-2024
The Met Gala, fashion's biggest night, was not just the A-list attendees who stole the spotlight—digital imposters in the form of AI-generated superstars sent social media into a frenzy. ... Read more
Published on: 05-10-2024
The 2024 FBI Internet Crime Report has revealed some frightening new trends and statistics that should have every business pausing to consider the state of their organization’s email security. Losses due to cybercrime have reached an all-time high of $12.5 billion, up 21.4% from the prior year.1 And, as predicted,... Read more
Published on: 05-09-2024
There are not a lot of email security platforms that can detect a phish hiding behind a Rich Text Format (RTF) attachment file. However, that’s exactly what was caught in a new phishing scam that took a very personalized approach to harvesting Microsoft credentials. With multiple versions at play, it’s... Read more
Published on: 04-30-2024
There is a lot of talk about vendor consolidation these days, and with good reason. When it comes to email security, the more vendors your customers have, the greater their risk. ... Read more
Published on: 04-12-2024
Phishing threats continue to be the most frequently used form of cybercrime, accounting for 34% of all complaints received by the FBI’s Internet Crime Complaint Center (IC3).1 This means costly trouble for individuals and businesses alike. For those wondering how phishing maintains its top position each year, the most obvious... Read more
Published on: 04-04-2024
Looking for the tell-tale signs of a phishing email is something many of us have come to do automatically. However, things get much trickier when the phishing emails come in the form of legitimate Adobe notifications, have been authenticated (SPF & DMARC) by adobe[.]com, and use actual Constant Contact tools... Read more
Published on: 03-12-2024
The State of Email Security If there is one thing about email security and phishing that you can count on, it’s cybercrime’s consistent upward climb. Year after year, phishers are improving their skills - devising more complicated phishing threats, designed to slip by Secure Email Gateways (SEGs) and fool recipients.... Read more
Published on: 02-20-2024
Whether it’s your favorite streaming service, or the laundry detergent that smells like your childhood, we all have our go-to brands. Why? Because the brands we love stand for something. They make our life better. They have value. They’re also familiar – we can recognize their logo instantly. ... Read more
Published on: 01-19-2024
We all have one, so call it what you will. Your John Hancock, autograph, inscription, endorsement, seal, scrawl, or our favorite…your ink(y). It’s more than just a few lines on a paper. Whether it’s the curve of your letters or the middle name that’s carried through your family for decades,... Read more
Published on: 11-09-2023
Trick-or-Treat.Hack Complete.Account Takeovers Are Tough to Beat.   ... Read more
Published on: 10-31-2023
Hollywood’s writers and actors have been feeling the financial pinch since both groups went on strike back in July. After five long months, Hollywood writers have finally returned to work, but the only actors who have been bringing home a paycheck are the bad actors. ... Read more
Published on: 10-27-2023
October is National Cybersecurity Awareness Month. It’s a time we are all called to consider our role in staying safe online, especially when it comes to the #1 source of cybercrime - email phishing. The volume of phishing emails has been increasing in strength for years. In fact, it’s estimated... Read more
Published on: 10-20-2023
When it comes to educating customers on the key elements of cybersecurity, every Managed Service Provider (MSP) has their own approach. Whether you stick to basic detection, protection, and recovery issues, or leverage recent cyber-catastrophes to spark a conversation, it’s always helpful to gain a different perspective. ... Read more
Published on: 10-13-2023
It’s no secret that one of the fastest growing sectors within the technology industry is cybersecurity. But while global spending is expected to grow by 13% this year, many businesses continue to struggle financially, due to a myriad of forces ranging from inflation and higher interest rates to war and... Read more
Published on: 09-28-2023
Parenting brings many joys, but the unanimous favorite this time of year is sending the kids back to school. It’s a feeling of euphoria that even the added morning traffic can’t spoil. ... Read more
Published on: 09-05-2023
When a company generating more than $86 billion in net revenue reaches out to do business with you, chances are they’ll have your full attention. ... Read more
Published on: 09-01-2023
Page Visitors