CyberSecurity

Catch-IT: Largest Collection of Breached Data Found – 3 Billion Accounts Compromised

Time to change those passwords again!  Two massive breaches occurred within the last month, totaling approximately 3 billion compromised usernames and passwords. On January 17, the details of the world’s largest online dump of personal data, Collection #1 was published.  This breach contained usernames and passwords relating to 772,904,991 [...]

By |2020-12-28T12:05:30-05:00February 13th, 2019|Categories: Advisory, Catch IT, CyberSecurity|

Catch-IT: Microsoft Releases Emergency Patch for Internet Explorer

Microsoft is urging users of the Internet Explorer to update their browser after finding a major flaw. The browser's memory corruption vulnerability lets attackers remotely execute code as if they were the computer's user, essentially giving them control of the computer, Microsoft wrote in a Wednesday security notice. An [...]

By |2020-12-28T11:31:13-05:00December 21st, 2018|Categories: Advisory, Catch IT, CyberSecurity|

The Passphrase – An Upgrade to your Current Password

It's time to upgrade your password.  Consider the following password Do's and Don'ts and the challenges they present. Let's start with the Don'ts: Password Don’ts Use your login name (ssmith) Use a sequence or repeated characters (“123456” or “abc123”) Reuse for different accounts Share. A secret is no longer [...]

By |2020-12-28T11:06:39-05:00November 20th, 2018|Categories: Advisory, CyberSecurity|

Embarrassment and Breached Passwords – the Latest Hacker Combination

A new scam has surfaced that uses a combination of breached passwords and adult content to scare people into paying bitcoin. This latest extortion campaign sends emails to compromised recipients, demanding payment or supposed video of them using an adult site would be released. What Can You Do? Since the message [...]

By |2018-09-10T14:56:17-05:00September 10th, 2018|Categories: Advisory, Catch IT, CyberSecurity|Tags: , |

Breach Response Checklist for Businesses

These days data breaches have become almost commonplace.  It's no longer "if you get breached" but rather "when you get breached".  While prevention is still key, it is important to implement procedures to quickly detect breaches and contain the damage once confirmed.   Likened to fire preparedness in an office building, [...]

By |2019-01-03T16:49:45-05:00July 9th, 2018|Categories: Advisory, CyberSecurity|Tags: , |

Recent Breach Targets Network Devices, Exposes Potential Vulnerability

There is a new hack in town that involves compromising large numbers of routers, switches, and other network devices belonging to governments, businesses, and critical-infrastructure providers. The Russian government-sponsored actors are using the compromised devices to perform man-in-the-middle attacks that extract passwords, intellectual property, and other sensitive information, and to [...]

By |2018-05-23T13:46:05-05:00May 23rd, 2018|Categories: Advisory, Catch IT, CyberSecurity|

The Rising Cost of Healthcare Data Breaches

Virtua Medical Group of South Jersey recently agreed to pay almost $418,000 as part of a settlement involving a breach of more than 1,600 medical patient files.  These patient records became viewable online due to a server misconfiguration by a 3rd party vendor. As a heavily regulated industry, healthcare data [...]

By |2019-02-07T10:04:05-05:00April 18th, 2018|Categories: Advisory, CyberSecurity|Tags: |

Microsoft Remote Access Protocol Flaw Affects All Versions of Windows

A serious vulnerability found in Microsoft's Credential Security Support Provider protocol (CredSSP) could allow a hacker to gain control of a domain server and other systems in the network. CredSSP protocol has been designed to be used by RDP (Remote Desktop Protocol) and Windows Remote Management (WinRM) that takes care [...]

By |2018-03-14T15:29:11-05:00March 14th, 2018|Categories: Advisory, Catch IT, CyberSecurity|
Go to Top