The New ZLoader Ransomware Variant

Search engines like Google are displaying search results that redirect the user to malicious links when they search for TeamViewer remote desktop software. These links download ZLoader malware onto the users’ system, creating a stealthy infection path that allows the attacker to install additional malware without detection.

China’s New Data Policy & What It Means

China enacted the Personal Information Protection Law (PIPL) on August 21, 2021 as part of that country’s growing scrutiny of its high tech sector. This law goes into effect on November 1, 2021 and will impose a new set of obligations for data security, especially when combined China’s Data Protection Law. Both of these laws fit into China’s information policy, …

The Conti Ransomware Gang & It’s Hacking Methods

The Conti ransomware gang is one of the most ruthless of its type. Beginning in early 2020, it has attacked organizations where the loss of data can have life-threatening consequences, including emergency medical services, hospitals, law enforcement agencies and 911 dispatch carriers. Ireland is still recovering from a Conti attack in May 2021 that resulted in the shutdown of that …

Phishing Deep Dive: Spear Phishing

Spear phishing and classic phishing are not one and the same. Discover how spear phishing emails differ from their classic counterparts and how to protect your company from spear phishing scams.

Phishing Deep Dive: Classic Phishing

Classic phishing is the most common type of phishing. Discover what it is and how to protect your company from this type of attack.

Introducing the Windows 365 Cloud PC

Microsoft has rolled out Windows 365, which provides the Windows 10 and Windows 11 operating systems as a cloud service. Discover how these “Cloud PCs” are enabling employees to work wherever they want using just about any device.

The Latest Data Breach & Why It Keeps Happening

The growing value of information is increasing the incentive of hackers to obtain data from both individuals and organizations. These incidents include ransomware attacks in which the perpetrator encrypts the victim’s data or threatens to publish that data unless the victim pays a ransom. Another tactic is to simply sell the information, either to a specific party or the highest …