Android Trojan Goes After Facebook Accounts

A new Android Trojan has hijacked more than 10,000 Facebook accounts by stealing session cookies, according to researchers at Zimperium. The malware uses social engineering to trick users into installing malicious apps from the Google Play Store and third-party app stores.“The threat actors made use of several themes that users would find appealing such as […]

Why implementing Zero Trust is more important than ever before

By Sree RamFive worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore why organizations should implement Zero Trust in 2021.In 2010, John Kindervag introduced the concept of “Zero Trust” which has become a touchstone for cyber resilience and persistent security. Zero Trust […]

Optrics Insider – Punk Spider, Irony Thy Name is Jim & What is Your Olympic Password?

Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the Punk Spider search engine for website vulnerabilities, the tech support scam that got Jim Browning’s Youtube channel deleted and the Olympic broadcaster who announced his password while on the air.Timecodes:0:00 – Intro0:21 – Today’s 3 topics0:40 – Topic 1: Punk Spider4:34 – […]

3 reasons to use network diagram software

By Gagana G.Due to the evolution of IT systems, the recent shift to a hybrid workforce, changing client requirements, and other reasons, network monitoring has become much more complex. IT admins need to visualize the entire network infrastructure effortlessly. Gaining visibility into the network makes it easy to spot patterns, proactively troubleshoot faults, ensure the […]

12 Steps to a Security Ignorance Program

Most people working for organizations have been exposed at some point in their careers to security awareness programs. Some of these programs are well-executed and delivered, while others consist of a disinterested security person talking through slides for 45 minutes.I’ve seen many good security awareness programs over the years, and at the same time, seen […]

Remote work and its lasting impact: What our global research uncovered

By Priyanka RoyThe COVID-19 pandemic has not only had a profound impact on everyone across the globe; it has also fundamentally changed the way organizations function. We are nearing one and a half years since remote work became the norm and organizations had to adapt to this new mode of working almost overnight. This rapid […]

Two of the Most Common and Successful Ransomware Attack Methods are Exposed

Researchers at Coveware recently analyzed ransomware attacks during Q2 of this year and noticed a similar trend in ransomware attack methods by cybercriminals.These are the two ransomware attack methods that are gaining popularity by ransomware gangs:Email Phishing Attacks – The most common form of a cyberattack. Cybercriminals are including a malicious attachment in the phishing […]

Boosting performance with network monitoring solutions

By Sharon AbrahamTechnological advances and emerging networking concepts are constantly shaping our IT infrastructure. Networks are no longer limited to traditional networking constraints such as its static nature, but are continually evolving to improve efficiency by spanning across wired, wireless, virtual, and hybrid IT environments. This IT evolution drives organizations to advance digitally and support […]

Optrics Insider – Print Driver Zero Day, SonicWall VPN Vulnerability & Kaseya Hacked

Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the printer driver nightmare zero day vulnerability, SonicWall’s VPN appliance is under attack and Kaseya’s recent ransomware attack.Timecodes:0:00 – Intro0:19 – Today’s 3 topics0:40 – Topic 1: Printer Driver Zero Day06:09 – Topic 2: SonicWall VPN Vulnerability10:38 – Topic 3: Kaseya VSA Hack17:04 […]

Optrics Insider – Dell Vulnerability, CVS Health Leak, WD MyBook Remote Factory Reset & Zero Trust

Join Scott Young and Shaun Sturby from Optrics Engineering as discuss  the Dell Bios Connect vulnerability, the 1 billion  records that were leaked from CVS Health, Western Digital’s MyBook  remote factory reset issue and the Zero Trust cybersecurity framework.Timecodes:0:00 – Intro0:19 – Today’s 4 topics0:42 – Topic 1: Dell Bios Connect Vulnerability4:14 – Topic 2: […]