Contact Us Today!

Google Chrome Update to Manifest V3

Google announced Manifest V3 in 2019 as a new capabilities and permissions framework for Chrome extensions. This new manifest would introduce stricter rules to upgrade user data security and privacy. Manifest V3 hopes to achieve the following:

Limit extension access to user network requests
Force developers to include all functionality within extension which stops the practice of hosting code remotely.

Penetration Testing Vs. Vulnerability Scanning: What’s the difference?

In today's technology-filled world we always hear about device security and hackers that infiltrate big corporate companies. It's more common than most people see and we need to protect ourselves and our companies' assets. Cyber Security should be taken seriously, so below we will review the two most common ways of finding out if your company is vulnerable.

DNS Hijacking

What is DNS?
DNS, short for Domain Name System, is the process of converting URLs like www.google.com to IP addresses so computers know where to take you. Think of IP addresses like addresses, without an address how would you know where someone's house is? DNS Hijacking is the process of intercepting the request and replying for the DNS server to point you to the wrong place.

New VMware Ransomware “Cheers”

A new ransomware named ‘Cheers’ is targeting VMware ESXi servers. VMware is a virtualization platform used by many large corporations. It has been targeted recently by many ransomware groups with the most recent attacks being LockBit and Hive.

When a VMware ESXi server is compromised, the attacker launches an encrypter which will stop all running virtual machines.

VMWare Exploit CVE-2022-22972

A VMware exploit is now available online which affects Workspace ONE Access, VMWare Identity Manager, and vRealize automation. The exploit has been given a CVE number of 2022-22972.

The exploit allows the attacker to bypass authentication and gain administrator permissions to the applications stated above.

5 Most common security breaches

From attacks on mobile devices to ever-increasing types of malware, cybersecurity has never been more challenging and important. One of the best ways to stay protected is to be aware of cybersecurity threats. Here are five common ways your IT systems can be compromised.

Surf securely with a VPN

There was a time when installing an antivirus program was enough to secure your data, but that’s no longer the case today. Whether you want to keep your online activities hidden from third parties or prevent your data from being intercepted by hackers, you need to invest in a virtual private network (VPN).
What is a VPN?
A VPN creates a secure tunnel between your device and the websites you visit, protecting you from hackers looking to intercept your data.

Tips for keeping your email safe

People rely on email to do a wide array of tasks. We use it to sign up for websites, apply for jobs, make payments, get in touch with friends and family, and many more. However, email is also commonly exploited by hackers to steal information or launch malware attacks.

The threat of distributed spam distraction

You wouldn’t think that cyber criminals would carry out their nefarious schemes in plain sight — except that they do and you’ve probably already fallen victim to them. Learn all about a scheme called distributed spam distraction (DSD) and how malicious actors are using it to steal valuable information from their victims.