Oct 14, 2025 | Continuous Diagnostics & Mitigation, Critical Infrastructure, Cybersecurity, Technology News
Red Hat admitted it was breached:
But have they failed to disclose what really happened? Maybe Red Hat is just going to wait that out, you know, just like the US Dept. of Treasury did after they were breached, then lied about the extent of the Hack, until the truth was realized and disclosed.
Oh well… here we go again.
Jul 4, 2024 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
There’s never a bad time to examine your company’s cybersecurity posture, and even improve your strategy. Threats abound, including security incidents resulting from weak passwords, phishing attacks, and the lack of strong authentication. Read on to learn how you can assess and improve your preparedness for security incidents–it’s not if, but when.
Jun 18, 2024 | Technology News
Big game cyber hunting is a type of cyberattack that usually leverages ransomware to target large, high-value organizations or high-profile entities. So the question is simple, how do they [the Hackers] determine high-value?
Jun 18, 2024 | Technology News
An investigation has uncovered a network of 19 websites created by Iran as part of a global influence operation. These sites, presenting themselves as independent sources of opinion and analysis, target audiences across the United States, Europe, the Middle East, the Caucasus, and South America. Two websites specifically target U.S. audiences with election-related content, one focusing on African Americans and another on U.S. veterans.
Jun 13, 2023 | SMB Technology, SMB Technology, SMB Technology, SMB Technology, Technology News
Now that Generative AI (e.g. ChatGPT) is here, phishing attacks may increase both in number and sophistication. How do businesses protect themselves? Awareness is a good first step, but gathering data using a security information and event management system (SIEM) is even better. Read on to learn how SIEM along with education and awareness training can reinforce your company’s efforts to prevent phishing attacks and resulting malware.