What is malware?
What is malware? Malware is a various type of malicious software, developed by the cybercriminals (called hackers) to allow them steal sensitive data, damage or destroy computers and computer systems. The common malware that the hackers usually hack into computers are viruses, worms, Trojan viruses, rootkits, spyware, and ransomware. The malware can install to your […]
Cybersecurity Threat Advisory: Cyberattacks on MGM Resorts
This Cybersecurity Threat Advisory highlights cyberattacks on MGM Resorts, a $33 billion hospitality and entertainment company operating out of Las Vegas. On Monday, September 11th, 2023, MGM Resorts experienced a ransomware attack that encrypted over 100 ESXi hypervisors and exfiltrated an unknown quantity of data. The group claiming responsibility for the attack is an advanced […]
Cybersecurity Threat Advisory: Apple releases patches for zero-day vulnerabilities
Apple has released more security patches after three zero-day vulnerabilities were discovered in iOS, iPadOS, MacOS, WatchOS, and Safari. These vulnerabilities are actively being exploited in the wild against several frameworks and systems of Apple products, making sixteen total zero-days in 2023. CSB recommends reviewing this Cybersecurity Threat Advisory in detail, and applying the latest […]
Critical Acrobat and Reader zero-day vulnerability
Adobe has taken proactive measures by issuing security updates to this zero-day vulnerability, which has been exploited in attacks. While comprehensive details about the attacks remain undisclosed, it has been stated that this zero-day vulnerability impacts both Windows and macOS operating systems. CSB recommends deploying Adobe’s security updates as soon as possible.
Spam: Spotting the threat
Spam is any email that arrives in your inbox uninvited. While most spam contains harmless promotional content, some spam emails contain malicious links or attachments developed by cybercriminals.
Spear Phishing: Spotting the Threat
Spear phishing is a highly personalized form of email phishing attack. Cybercriminals research their targets and craft highly personalized messages, often impersonating a trusted colleague, website, or business.
URL Phishing: Spotting the Threat
Cybercriminals use fake websites to trick victims into keying in sensitive information through a tactic known as URL phishing.
Account Takeover: Spotting the Threat
Account takeover is a form of identity theft and fraud, where a malicious third party successfully gains access to a user’s account credentials.