This Malware Can Turn Off Windows Defender

Some malware strains are built with robust protections in order to avoid detection. Zloader goes a step further and actually disables Microsoft Defender AV (formerly known as Windows Defender). That's significant because ...

Ransomware Attackers Look For Unpatched Systems To Exploit

Not long ago Microsoft patched a critical MSHTML remote code execution security flaw being tracked as CVE-2021-40444. Beginning on August 18th of this year (2021) the company spotted hackers exploiting this flaw ...

Report Finds One Third Of Suspicious Emails Are Threats

Employee cybersecurity training is paying off according to a report recently released by IT security company F-Secure. Researchers from F-Secure analyzed more than 200,000 ...

Hackers Behind REvil Ransomware Are Back Online

Not long after successfully attacking Kaseya the band of cyber criminals behind the REvil ransomware strain went dark. Their "Happy Blog" mysteriously went offline. It is not known if the group went ...

Hackers Are Using Windows 11 Curiosity To Load Malware

Millions of people around the world are understandably curious about Windows 11. It's easy to understand why. A new OS offered by the company ...

Benefits of Outsourcing IT Through Managed Services

Outsourcing IT via managed services offered by IT service firms has many benefits. Control IT costs Outsourcing makes fixed IT ...

Risk management for small businesses

Understanding and managing the risks that your small business faces will increase your chances of success and long-term growth. The steps of risk ...

Exchange Servers Are The Target Of This New Ransomware

A new ransomware gang known as "LockFile" has recently burst onto the scene. They specifically target Microsoft Exchange servers to gain access then proceed to encrypt everything they can find. LockFile employs ...

Five Ways Your Employees will Invite Hackers into Your Network

Hackers in movies are glamorous, no matter if they're heroes or criminals. These hackers are those who hack into hostile foreign government databases ...

Four Must-Have Low-Risk Cloud Solutions

Your business is in fierce competition. They'll eat your business alive if they catch up to you in the technology "arms ...