1.978.662.2041 info@northeast-tech.com

Resources

Threat actors are abusing Google Translate’s redirect feature to craft phishing links that appear to belong to, according to researchers at Abnormal Security. ... Read more
Published on: 01-20-2025
An SMS phishing (smishing) campaign is attempting to trick Apple device users into disabling measures designed to protect them against malicious links, BleepingComputer reports. ... Read more
Published on: 01-20-2025
Interpol has recently recommended discontinuing the use of the term "Pig Butchering" in cybercrime discussions, expressing concern that such terminology may discourage victims from reporting incidents due to feelings of shame or embarrassment. ... Read more
Published on: 01-20-2025
Social engineering and phishing are involved in 70% - 90% of data breaches. No other root cause of malicious hacking (e.g., unpatched software and firmware, eavesdropping, cryptography attacks, physical theft, etc.) comes close. ... Read more
Published on: 01-17-2025
Check out the December updates in Compliance Plus so you can stay on top of featured compliance training content. ... Read more
Published on: 01-17-2025
Ransomware groups claimed responsibility for 5,461 attacks in 2024, with 1,204 of these attacks being publicly confirmed by victim organizations, according to Comparitech’s latest Ransomware Roundup report. ... Read more
Published on: 01-17-2025
I have helped people detect romance scams for decades. It is still very common for romance scammers to leverage both pictures of celebrities and pictures of innocent, everyday people as part of these scams.  ... Read more
Published on: 01-17-2025
In cybersecurity, email has always been a critical concern. However, we feel the new 2024 Gartner® Magic Quadrant for Email Security Platforms™ has signaled a shift in how we approach email protection. ... Read more
Published on: 01-16-2025
Check out the 52 new pieces of training content added in December, alongside the always fresh content update highlights, new features and events.  ... Read more
Published on: 01-16-2025
Japan’s National Police Agency (NPA) has attributed more than 200 cyber incidents over the past five years to the China-aligned threat actor “MirrorFace,” Infosecurity Magazine reports. ... Read more
Published on: 01-15-2025
The UK government decided to wage war on explicit deepfakes. About time, right? But before we start celebrating, let's take a closer look. ... Read more
Published on: 01-13-2025
A phishing campaign is abusing Microsoft 365 test domains to send legitimate payment requests from PayPal, according to Fortinet’s CISO Dr. Carl Windsor. ... Read more
Published on: 01-09-2025
Researchers at SlashNext warn that cybercriminals are using a WordPress plugin called “PhishWP” to spoof payment pages and steal financial information. ... Read more
Published on: 01-09-2025
In a significant milestone for global cybersecurity, the United Nations General Assembly has adopted a new, legally binding treaty on cybercrime. This treaty, known as the United Nations Convention against Cybercrime, represents a crucial step in the ongoing battle against digital threats. With cybercrime affecting over two-thirds of the global... Read more
Published on: 01-09-2025
As a Managed Service Provider (MSP), your days are filled with a myriad of tasks, from monitoring client systems to resolving complex IT issues. But what if you could find more time in your day to take on new customers and expand your business? We’d like to share four tips... Read more
Published on: 12-05-2024
Cyber Monday sales are expected to hit a record $13.2 billion on Monday, which is 6.1% more than in 2023.1 While this is great for online retailers, it’s important to remember that cybercriminals are just as excited as you are about the holiday rush. ... Read more
Published on: 12-02-2024
When Telegram CEO, Pavel Durov, was arrested in August of 2024 it put the spotlight on the criminal use of third-party platforms. The arrest came because of what officials believed to be a lack of moderation and cooperation from Telegram in fighting crimes against children. While crimes of this nature... Read more
Published on: 11-15-2024
Email security is more critical than ever, and for good reason. Phishing and spoofing attacks continue to wreak havoc on organizations of all sizes. One of the best defenses against these threats is the DMARC (Domain-based Message Authentication Reporting and Conformance) protocol, which helps prevent unauthorized use of your domain... Read more
Published on: 10-16-2024
Gone are the days when phishing emails could be identified with just a discerning eye. Those tell-tale grammar, punctuation, and usage errors were quickly corrected, thanks to generative Artificial Intelligence (AI) and Large Language Models (LLMs). Next to arrive on the scene were AI tools designed to detect AI generated... Read more
Published on: 10-04-2024
QR code phishing has become one of the most rapidly growing forms of phishing, especially since QR codes gained popularity during the global pandemic. Recently, INKY has observed a new evolution of this tactic, where QR codes are constructed using HTML tables and ASCII characters. We've noticed this technique emerging... Read more
Published on: 08-29-2024
It’s no secret that as a Managed Service Provider (MSP) you’re at the forefront of integrating and managing artificial intelligence (AI) solutions for your clients. While AI offers an array of benefits, from enhancing operational efficiency to proactive security measures, not every organization has the knowledge and understanding necessary to... Read more
Published on: 08-20-2024
If you’ve ever bought a raffle ticket, purchased a lottery ticket, or called into a radio station for concert tickets, you’ve pictured yourself on the winning side of a prize. It’s a nice feeling. Whether you chalk it up to serotonin, dopamine, or human nature, winning makes us feel good.... Read more
Published on: 07-25-2024
Millions of companies worldwide are reeling from the major cyber outage caused by a faulty system update released by the cloud-based cybersecurity firm CrowdStrike. Slated by some as causing ‘global chaos’, the outage has impacted hospitals, police stations, airlines, banks, stock exchanges, consumers, and more.1 ... Read more
Published on: 07-19-2024
Black Friday has nothing on Amazon Prime Day. ... Read more
Published on: 07-16-2024
In today's digital landscape, email remains a primary target for cybercriminals. Phishing attacks, sophisticated forgeries, and malicious content are constantly evolving, and with language processing tools like ChatGPT, phishers can compose high-quality phishing emails, write code, and create sophisticated malware with minimal effort. It’s a disturbing sign of the times,... Read more
Published on: 07-12-2024
As a Managed Service Provider (MSP) every client you have counts on you to keep their networks and IT infrastructure up and running, around the clock. It’s not an easy calling and with the current state of cybersecurity, a lot of things could potentially keep you up at night. For... Read more
Published on: 07-09-2024
The world is gradually learning what INKY and Managed Service Providers (MSPs) have known for some time: Artificial intelligence (AI) is a powerful tool that can be used to improve cybersecurity. ... Read more
Published on: 05-31-2024
Like any enterprise, there are costs associated with doing business. In the world of cybercrime, threat actors have plenty of options. ... Read more
Published on: 05-23-2024
Page Visitors