Colonial Pipeline Recovers Ransomware Payment
Posted June 7, 2021 in Ransomware, Data Breach, Malware
The DOJ recovered a significant portion of Colonial Pipeline's $4.4M ransom payment. See how authorities tracked the...
Malicious USB Cables: Hidden Cybersecurity Threat
Posted June 3, 2021 in Malware, Data Breach, Penetration Testing
Hackers now embed attack tools inside ordinary-looking USB cables. Learn why you should never borrow a charging cord...
Colonial Pipeline Pays $5M Ransom: What Went Wrong
Posted May 14, 2021 in Ransomware, Data Breach, Malware
Colonial Pipeline paid $5 million to hackers who crippled US fuel supplies. Learn how the attack succeeded and what...
Biden Signs Cybersecurity Executive Order
Posted May 13, 2021 in Data Breach, Compliance, Malware
The White House executive order mandates sweeping federal cybersecurity improvements. Discover what the new...
Colonial Pipeline Cyberattack Shuts Operations
Posted May 8, 2021 in Data Breach, Cloud Security, Malware
A ransomware attack forced Colonial Pipeline to shut down 5,500 miles of fuel infrastructure. Learn how the attack...
Facebook Data Leak: How to Protect Your Information
Posted April 5, 2021 in Data Breach, Malware, Cloud Security
Over 500 million Facebook users' personal data was posted in a hacking forum. Check if you are affected and take...
New Year Tech Tips to Start the Year Secure
Posted March 6, 2021 in Malware, AI, Data Breach
The holidays are the perfect time to upgrade your family's tech habits. Get practical cybersecurity tips to protect...
CES Tech Trends: What to Expect This Year
Posted March 6, 2021 in AI, Cloud Security, Data Breach
CES showcases the technology shaping our future, from AI to smart devices. Explore the top innovations and trends you...