Hiatus Malware Targets Business Routers

Hiatus Malware Targets Business Routers

There is a new malware campaign targeting business-grade routers. It is called Hiatus, a complex operation that deploys the HiatusRAT malware. It is a kind of Remote Access Trojan (RAT) that cybercriminals use to gain remote control over a target system. Hiatus is the...
Cerebral Data Breach – 3.18 Million Affected

Cerebral Data Breach – 3.18 Million Affected

Cerebral, an online platform that offers mental health care services, recently suffered a data breach that may have affected up to 3.18 million users. According to its report, the breach was due to the company’s use of third-party pixel trackers. Cerebral did not say...
Reduce the Risk of Business Email Compromise Attacks

Reduce the Risk of Business Email Compromise Attacks

Email threats have been around since the early 90s. But phishing techniques are much more sophisticated now than they were back then. One of the most successful and lucrative tactics is business email compromise (BEC). BEC scams have stolen over $43 billion from...
Maintain Customer Trust By Scaling Up IT Systems

Maintain Customer Trust By Scaling Up IT Systems

Every business owner knows that forming a strong relationship with customers is essential to succeed. And two important elements of this relationship are positive customer experience and customer trust. Having these will help you bring in new customers and repeat or...
Hatch Bank Falls Victim to Data Breach

Hatch Bank Falls Victim to Data Breach

Hatch Bank confirmed a data breach that compromised its customers’ personal data. The financial technology firm said hackers found a vulnerability in its internal file-transfer software. This allowed the hackers to access and steal around 140,000 customer names...
Chick-fil-A Confirms Credential Stuffing Attack

Chick-fil-A Confirms Credential Stuffing Attack

Credential stuffing is one of the many forms of cyberattacks on the rise. It’s a low-risk, low-cost automated method. It uses bots to access username-password combinations from past data breaches. It then uses that information to exfiltrate data from a new...
Generated by Feedzy