Blog

Be On The Lookout As Astaroth Malware Makes A Comeback

Are you familiar with Astaroth? If you're a data security professional, you've probably at least heard the name. The group gained some notoriety last year when it came to light that they ...

Coronavirus Health Notifications Being Used To Carry Malicious Threats

A Pakistani-based hacking group that goes by a variety of names, including "Transparent Tribe," "APT36," "Mythic Leopard" and others has been discovered to be behind a particularly nasty attack recently. Researchers with ...

Phone Call And Text Phishing Scams Are On The Rise

For the last couple of years, the primary means of communication when conducting phishing campaigns has been email. Phishing emails have been absolutely rampant. So much so that people are increasingly on ...

New Phishing Emails Trick Users With Convincing Security Credentials

Unit 42 is a research division of Palo Alto Networks. Their researchers have discovered a sneaky and surprisingly effective phishing campaign that appears to have been launched in January of this year ...

New Android Malware Can Get Past Two-Factor Authentication

Since 2010, Google has been doing its part to help keep its massive user base safe. They introduced a small but critical service called Google Authenticator, which is used by a number ...

Emails Pretending To Be Secret Admirers Could Be Ransomware

Nemty Ransomware isn't an especially well-known threat, but it's dangerous and should not be discounted. Recently, researchers have discovered an ongoing spam-email driven campaign that's attempting to spread the ransomware far and ...

Dangerous New Trojan Can Infect Systems Through Wifi

If you're not already familiar with the Emotet trojan, it deserves a special spot on your radar. It's one of the most dangerous forms of malware in the world today. Their success ...

Financial Organizations Beware Of Documents Asking To Enable Content

If you work in the financial sector, be advised that there's a large scale botnet-driven malware campaign underway. It has been targeting firms in both the US and the UK. The malware ...

New Ransomware Leaks Confidential Data To Public

There's a disturbing emerging trend in the world of hackers who make use of ransomware to extort payment from companies. Increasingly, if a company won't pay, their data that was stolen and ...

Upgrade From Windows 7 Now To Avoid Security Risks

By the time you read these words, the last day for Windows 7 support has already come and gone. The date set by Microsoft has been well known to most Windows 7 ...

Contact

SMB Technologies, Inc.SMB Technologies, Inc. Logo $$$
SMB Technologies,Consultant,Portland,OR