<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=176059862897267&amp;ev=PageView&amp;noscript=1">

Most Recent

How to Assess and Manage Cyber Risk for Your Enterprise

Posted by Security Tech Alliance on Aug 22, 2017 8:07:00 AM | Topics: Risk Management, Data Protection, Network Security

In the wake of a phishing scam that victimized internet giants Facebook and Google to the tune of $100 million, it’s clear that CEOs at every level should take steps to protect their organizations from cyber risks. From 2013 to 2015, the companies were fooled into wiring money to a Lithuanian hacker, believing he was a legitimate electronics manufacturer.

Read More

Google and Facebook Hit by $100M Phishing Scam

Posted by Security Tech Alliance on Aug 1, 2017 7:54:00 AM | Topics: Risk Management

A Lithuanian man allegedly pulled off an elaborate scheme in which he impersonated a large Taiwanese electronics company and collected millions of dollars in fraudulent payments from internet giants, Google and Facebook.

Read More

Exponential: How DDoS Attacks Have Scaled

Posted by Security Tech Alliance on Jun 20, 2017 8:00:00 AM | Topics: Risk Management, Cloud Security

A Distributed Denial of Service (DDoS) attack is a bad actor’s attempt to disrupt a company’s web services with a flood of illegitimate traffic. They are impossible to prevent, difficult to mitigate, and financially devastating for their victims.

Read More

Phishing Scam Uses IDN to Spoof Legitimate Websites

Posted by Security Tech Alliance on Jun 6, 2017 7:58:00 AM | Topics: Access Management, Risk Management, Malware

Out on the water, anglers capture their prey by tricking fish with fake lures. Plastic and metal bait manufacturers attempt to perfect these decoys with physical resemblance, like producing tiny flies that look like real insects. Some actually move around and make sounds like living bait. Hackers that develop phishing schemes use the same kind of ingenuity to invent new ways of fooling employees into clicking on infected emails and websites.

Read More

Protecting Your Network From the Vulnerabilities of Open-Source IoT

Posted by Security Tech Alliance on May 18, 2017 10:03:00 AM | Topics: IoT, Data Protection, Malware, Risk Management

There is a perfect storm brewing in the internet ecosphere. IoT’s dramatic growth, combined with increased dependence on sensors to drive big data analytics and the proliferation of botnets that can seize control of IoT devices, has caused a whirlwind of trouble in the IT world.

Read More

Unpatched Security Flaws Expose Linksys Routers

Posted by Security Tech Alliance on May 16, 2017 7:45:00 AM | Topics: Risk Management, Data Protection, Access Management

In October 2016, Dyn, a domain name system (DNS) provider for many high-profile websites, experienced a 2-wave distributed denial of service attack (DDoS) that denied user access to their customers’ websites. The Mirai botnet used 10s of millions of IP addresses to create so much traffic that it crippled Dyn’s network.

Read More

Is Your Port 3389 Safe From Samas? | Ransomware

Posted by Security Tech Alliance on May 9, 2017 8:00:00 AM | Topics: Malware, Risk Management, Data Protection, Firewall

In our last blog, we profiled a recent ransomware attack that exploited a new attack vector. Instead of reeling in a victim with an infected phishing email, the hacker used an exposed remote desktop protocol (RDP) port to gain entry to the victim’s system.

Read More

How Ransomware Is Evolving Beyond Phishing Attacks | Security Threats

Posted by Security Tech Alliance on May 5, 2017 10:02:00 AM | Topics: Risk Management

Ransomware has become Public Enemy No. 1 in the march against cybercrime. Attacks on hospitals, schools, and, surprisingly, police departments, have paralyzed vital community resources. 

Read More

BrickerBot Malware Permanently Disables IoT Devices | IoT Security

Posted by Security Tech Alliance on May 1, 2017 11:24:05 AM | Topics: Malware, IoT, PDoS, Risk Management

On April 19, TrendMicro security analysts released an intelligence report about a new type of malware targeted at internet of things (IoT) devices. The malware, dubbed BrickerBot, exploits security flaws in a device’s hardware and modifies, or bricks, its firmware to render it permanently inoperable.

Read More

3 Network Blind Spots Hackers Love to Target | Network Security

Most organizations’ networks are getting bigger and more complex, with vast numbers of endpoints spread out across larger geographical areas. The scale and complexity of today’s networks create blind spots for hackers to target.

Read More

Blog Search


Get this eBook covering three prominent threats faced by six critical industries.

Get Your eBook


Stay up-to-date with the latest cyber-security developments and threats facing organizations today. You will receive actionable information to keep your data and applications secure.