1.978.662.2041 info@northeast-tech.com

Resources

A new and concerning cybersecurity trend has emerged. According to the latest Q3 2024 Cato CTRL SASE Threat Report from Cato Networks, ransomware gangs are now actively recruiting penetration testers to enhance the effectiveness of their attacks. ... Read more
Published on: 11-20-2024
The newly released single largest analysis of cyber attacks across all of 2023 show a strong tie between the use of phishing and techniques designed to gain credentialed access. ... Read more
Published on: 11-20-2024
About five years ago, I was having trouble with an expensive brand-name refrigerator that my wife and I had bought. It was a great refrigerator feature-wise. My wife and I initially loved it. But it kept breaking. And each break, even though it was covered by the warranty, took weeks... Read more
Published on: 11-20-2024
As the holiday shopping season kicks into high gear, cybercriminals are gearing up too. This year, alongside the usual suspects, we're seeing some crafty new scams, so let’s take a look at some of the ones you should be most careful of during Black Friday, Cyber Monday and Giving Tuesday.... Read more
Published on: 11-20-2024
The Swiss National Cyber Security Centre (NCSC) has warned of a QR code phishing (quishing) campaign that’s targeting people in Switzerland via physical letters sent through the mail, Malwarebytes reports. ... Read more
Published on: 11-20-2024
Cybersecurity threats grow more sophisticated by the day. Amid this constant change, one truth remains: people are simultaneously our greatest security vulnerability and our strongest line of defense. It’s time to empower organizations with a new approach that minimizes human risk and maximizes protection. ... Read more
Published on: 11-19-2024
In my most recent book, Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing, I highlight the use of “champions," which are co-workers in your organization who can help spread security awareness training to better lower human risk. ... Read more
Published on: 11-19-2024
KnowBe4, the leading platform for security awareness training, is excited to bring the award-winning original series, "The Inside Man,” back to your screens with more excitement, drama, and cybersecurity lessons than ever before. ... Read more
Published on: 11-19-2024
Threat actors are exploiting Microsoft Visio files and SharePoint to launch two-step phishing attacks, according to researchers at Perception Point. ... Read more
Published on: 11-15-2024
New data shows just how crippling ransomware has been on small businesses that have fallen victim to an attack and needed to pay the ransom. ... Read more
Published on: 11-15-2024
We’re thrilled to announce the long-awaited sixth season of the award-winning KnowBe4 Original Series - “The Inside Man” is now available in the KnowBe4 ModStore! ... Read more
Published on: 11-14-2024
In the ever-evolving landscape of cybersecurity, the convergence of Artificial Intelligence (AI) and Open-Source Intelligence (OSINT) has created new opportunities for risk. ... Read more
Published on: 11-13-2024
Researchers at IBM X-Force are tracking a phishing campaign by the criminal threat actor “Hive0145” that’s using stolen invoice notifications to trick users into installing malware. ... Read more
Published on: 11-13-2024
A new report from ESET has found that most nation-state threat actors rely on spear phishing as a primary initial access technique. ... Read more
Published on: 11-12-2024
When Telegram CEO, Pavel Durov, was arrested in August of 2024 it put the spotlight on the criminal use of third-party platforms. The arrest came because of what officials believed to be a lack of moderation and cooperation from Telegram in fighting crimes against children. While crimes of this nature... Read more
Published on: 11-15-2024
Email security is more critical than ever, and for good reason. Phishing and spoofing attacks continue to wreak havoc on organizations of all sizes. One of the best defenses against these threats is the DMARC (Domain-based Message Authentication Reporting and Conformance) protocol, which helps prevent unauthorized use of your domain... Read more
Published on: 10-16-2024
Gone are the days when phishing emails could be identified with just a discerning eye. Those tell-tale grammar, punctuation, and usage errors were quickly corrected, thanks to generative Artificial Intelligence (AI) and Large Language Models (LLMs). Next to arrive on the scene were AI tools designed to detect AI generated... Read more
Published on: 10-04-2024
QR code phishing has become one of the most rapidly growing forms of phishing, especially since QR codes gained popularity during the global pandemic. Recently, INKY has observed a new evolution of this tactic, where QR codes are constructed using HTML tables and ASCII characters. We've noticed this technique emerging... Read more
Published on: 08-29-2024
It’s no secret that as a Managed Service Provider (MSP) you’re at the forefront of integrating and managing artificial intelligence (AI) solutions for your clients. While AI offers an array of benefits, from enhancing operational efficiency to proactive security measures, not every organization has the knowledge and understanding necessary to... Read more
Published on: 08-20-2024
If you’ve ever bought a raffle ticket, purchased a lottery ticket, or called into a radio station for concert tickets, you’ve pictured yourself on the winning side of a prize. It’s a nice feeling. Whether you chalk it up to serotonin, dopamine, or human nature, winning makes us feel good.... Read more
Published on: 07-25-2024
Millions of companies worldwide are reeling from the major cyber outage caused by a faulty system update released by the cloud-based cybersecurity firm CrowdStrike. Slated by some as causing ‘global chaos’, the outage has impacted hospitals, police stations, airlines, banks, stock exchanges, consumers, and more.1 ... Read more
Published on: 07-19-2024
Black Friday has nothing on Amazon Prime Day. ... Read more
Published on: 07-16-2024
In today's digital landscape, email remains a primary target for cybercriminals. Phishing attacks, sophisticated forgeries, and malicious content are constantly evolving, and with language processing tools like ChatGPT, phishers can compose high-quality phishing emails, write code, and create sophisticated malware with minimal effort. It’s a disturbing sign of the times,... Read more
Published on: 07-12-2024
As a Managed Service Provider (MSP) every client you have counts on you to keep their networks and IT infrastructure up and running, around the clock. It’s not an easy calling and with the current state of cybersecurity, a lot of things could potentially keep you up at night. For... Read more
Published on: 07-09-2024
The world is gradually learning what INKY and Managed Service Providers (MSPs) have known for some time: Artificial intelligence (AI) is a powerful tool that can be used to improve cybersecurity. ... Read more
Published on: 05-31-2024
Like any enterprise, there are costs associated with doing business. In the world of cybercrime, threat actors have plenty of options. ... Read more
Published on: 05-23-2024
The 2024 FBI Internet Crime Report has revealed some frightening new trends and statistics that should have every business pausing to consider the state of their organization’s email security. Losses due to cybercrime have reached an all-time high of $12.5 billion, up 21.4% from the prior year.1 And, as predicted,... Read more
Published on: 05-09-2024
There are not a lot of email security platforms that can detect a phish hiding behind a Rich Text Format (RTF) attachment file. However, that’s exactly what was caught in a new phishing scam that took a very personalized approach to harvesting Microsoft credentials. With multiple versions at play, it’s... Read more
Published on: 04-30-2024
There is a lot of talk about vendor consolidation these days, and with good reason. When it comes to email security, the more vendors your customers have, the greater their risk. ... Read more
Published on: 04-12-2024
Page Visitors