Black market traders cash in on fake COVID-19 vaccination records

Researchers have uncovered a lively trade online in the sale of fake vaccination records and passports.  COVID-19 prompted panic buying and price hikes for basic necessities worldwide when the pandemic…

False Government Websites Steal Private Financial Data, FBI warns

A warning comes from the FBI announcing that cybercriminals use new methods to collect financial data and personal information, making use of false websites posing as government platforms. Their goal…

What Is Privileged Account and Session Management (PASM)?

Privileged Account and Session Management (PASM) is a new PAM (Privileged Access Management) that focuses on privileged account monitoring and management for compliance, security, and data integrity purposes. Whereas PAM…

Cloud security is an ongoing struggle to keep sensitive data safe. Is it getting any easier?

The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe.  2020 marked a record number of cyberattacks. Cloud-based…

CryptoRom Scam Rakes in $1.4M by Exploiting Apple Enterprise Features

The campaign, which uses the Apple Developer Program and Enterprise Signatures to get past Apple’s app review process, remains active. Pyramid-scheme cryptocurrency scammers are exploiting Apple’s Enterprise Developer Program to…

Heimdal™ Security SOC Team Discovers Typosquatting Domain Masquerading as Crypto-Swapping Platform

Heimdal™ Security’s Security team has recently unearthed a new typosquatting domain specifically crafted to resemble Trader Joe XYZ’s URL, one of the most sought-after cryptocurrency trading platforms. Tricked by a…

Romance scammers exploit Apple's developer program to spread fake cryptocurrency apps

Written by Tonya Riley Oct 13, 2021 | CYBERSCOOP Fraudsters are using the promise of love to lure victims into downloading fake cryptocurrency trading apps and then stealing their funds,…

Double Extorsion Ransomware: The New Normal

With more and more businesses learning how to avoid paying huge amounts of money to ransomware actors by maintaining up-to-date backups and having disaster recovery plans in place, the number…

Intune vs. WSUS vs. SCCM – Costs, Benefits, Ease of Use, and Deployment

Patching has certainly gained a lot of momentum ever since research has proven that ‘unattended’ apps and software can quickly lead to a data leak.  Patching is the new ‘kid’…

The Value of SubscriptionsBy Jim O’Gorman

We recently announced our new subscription products, Learn One and Learn Unlimited, and we are really excited about the response they have received. These subscription products represent a change from…