Technical Support: 412-349-6678 | Incident Response

Tag: hackers

Monitoring for cyber security breaches

2021 Resolution #3: Monitoring for Trouble

You strive for the best network security. You buy the best tools, implement overlapping layers of security, train your employees, and you practice good password hygiene. Even so, you discover holes built into your security. While a breach is not guaranteed, security flaws will certainly be discovered, even with the...
cyber security predictions for 2021

Cyber Security Predictions For 2021

Between COVID-19 and economic slowdowns, we can’t wait for 2020 to end so we can start the new year fresh. Unfortunately, cybercriminals who thrived upon phishing and ransomware attacks will be working hard to continue their success into 2021. To keep us ahead of the attackers, many experts have predicted...
Hackers look for vulnerabilities, and you should too

How Hackers Teach You About Your Vulnerabilities

When companies get hacked, word spreads quickly. Hackers add new features all the time. And, often they specialize their attacks to focus on new vulnerabilities in order to gain advantages over other hackers. That's just one reason you'll want to keep an eye on these attacks. By studying the hacked...
credential stuffing - woman working on a laptop

Credential Stuffing is a Problem, and Here’s Why

Credential Stuffing 101 Maybe you've experienced it. It's very likely that you've, at least, heard about it. Cybercriminals are taking over online accounts and organizational systems at a rapid pace. So, why is that happening? Simply put: Hackers are credential stuffing. Credential stuffing is a subset of brute-force password attacks....
Botnets - what are botnets and how to counter them - Ideal Integrations

What Are Botnets and How to Address Them

Botnet hackers obtain access to computers, servers, and/or IoT devices, then install software to perform command and control (C2) functions. These infected devices become slave devices, or robots, for the hacker who uses them to form a network (roBOT + NETwork = BOTNET). Historically, botnets used a client-server model to...