May 23, 2022 | Business IT News, Security Advisories
Hackers leverage 22 year-old Office RCE bug in a malicious email campaign to spread Snake keylogger via Microsoft Word alongside PDFs. The majority of malicious e-mail campaigns use Word documents to hide and spread malware, however, a recently discovered campaign...
May 20, 2022 | Business IT News
The Department of Justice has announced a revision on policy on how federal prosecutors should charge violations of the Computer Fraud and Abuse Act (CFAA). This, essentially, means that the DOJ will no longer prosecute ethical hackers, also known as...
Apr 29, 2022 | Business IT News, Security Advisories
A joint Cybersecurity Advisory (CSA) released by authorities of the United States, Australia, Canada, New Zealand and the United Kingdom provides details on the top 15 common vulnerabilities and exposures (CVEs). These are vulnerabilities that were routinely exploited...
Jun 17, 2019 | Uncategorized
IT complexity is a growing challenge for all businesses, regardless of size. The reason is that IT is now integral to virtually every business process. Every company now needs a plan, devised by professionals, for support, security, data protection, business...
May 29, 2019 | Business IT Tips
The Problem Business leaders do not always see the value when it comes to IT Security. They often do not see it as a competitive advantage either. Even though high-profile cases (hacks, ransomware attacks etc.) help, the vast majority continue to operate under the...