• Call us: (708) 365-1000 | (847) 450-6500
  • Blog item

  • If you're involved in information security in any capacity, you're probably quite familiar with the infamous Emotet botnet.  It's one of the most dangerous and prolific botnets out there and it is a dire threat to organizations of all sizes. The bad news is that the botnet is still being actively enhanced and is gaining new capabilities at regular intervals. Most recently, its developers have added a new credit card stealing module that is designed to harvest saved credit card [...]

    Read more

    Depending on where you live, you may have received medical care from the Shields Health Care Group (Shields), or from a provider associated with them. If so, be aware that the Massachusetts-based medical provider specializing in PET/CT scans, MRIs, radiation oncology, and ambulatory surgical services has been hacked. The unknown hackers gained access to their network and stole data relating to more than 2 million users. According to the breach notification that the company [...]

    Read more

    Are you a WhatsApp user?  If so, be aware that hackers have worked out a means of hijacking a user's WhatsApp account and gaining access to a user's contact list and personal messages. The attack relies on mobile carriers' automated service to forward calls to different phone numbers, which is a service every major mobile carrier offers. Unfortunately, it can be exploited by hackers by tricking users into forwarding their calls to a number that the hackers control. So when [...]

    Read more

    Teams was "just another Microsoft application" before the pandemic.  Thanks to Covid-19 though, demand for video conferencing solutions shot through the roof, and suddenly Teams found its groove. Microsoft had been gamely trying to bolster its popularity and the pandemic certainly helped. For more than two years, the Redmond giant has been pouring an increasing number of resources into polishing Teams and really making it shine. Recently (May of this year), Microsoft made a [...]

    Read more

    Do you own a Chevrolet, Buick, GMC, or Cadillac?  If so, be aware that GM recently acknowledged that they fell victim to a credential stuffing attack a little over a month ago. The attack exposed some customer information to the attackers and allowed them to redeem an undisclosed number of rewards points for gift cards. The company said that they detected suspicious network activity between April 11th and April 29th of 2022.  In a letter sent to those impacted [...]

    Read more

    A browser hijacker called "ChromeLoader" has had a large uptick in detections this month, which is raising eyebrows among security professionals. ChromeLoader can modify a victim's web browser settings to show search results that promote unwanted (and usually spammy) software, annoying pop-up ads, fake giveaways, adult games, dating sites, surveys, and the like. As malware goes, there are far worse strains out there.  Rather than infect you with malicious code that locks all [...]

    Read more

    HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply still being employed, but hackers are making surprisingly regular use of it.  The security company detected more than two million emails of this kind targeting Kaspersky customers in the first four months of the year (2022). The specific breakdown of monthly instances looks like this: [...]

    Read more

    Do you own and manage a WordPress site either personally or as part of your business?  Do you also use the Tatsu plugin which offers a powerful suite of in-browser editing features and has been installed by more than 100,000 users worldwide? If so, be aware that there is a serious security flaw in the plugin, and you should update right away to minimize your risk. The vulnerability in this case is being tracked as CVE-2021-25094 and allows a remote attacker to execute arbitrary [...]

    Read more

    The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you're using VMware products that are impacted by recently disclosed critical security flaws, either patch them immediately or remove them from your network. CISA issued the dire warning because the last time critical security flaws were discovered in VMware products, hackers began exploiting them within 48 hours after they were disclosed. In this case, the two [...]

    Read more

    Phishing campaigns get more effective the more closely they can imitate a trusted source.  Recently, security researchers at Fortinet discovered evidence of a phishing campaign that specifically targets Microsoft Windows users and installs three different types of malware on the systems it manages to infect. Among other things, this campaign gives the hackers behind it the ability to steal usernames, passwords, banking details, and more. That is in addition to leveraging the [...]

    Read more