top of page
Search


5 Common Mistakes When Migrating to the Cloud
Embracing amazing new technology can provide incredible results for a business’s technological scalability and reliability, but...

echoudhury77
Jun 8, 20212 min read
Â
Â
Â


Chinese and the Russians
When you hear about ransomware attacks and ransom demands, more often than not, it can be traced back to Russian threat actors (or...

echoudhury77
Jun 3, 20212 min read
Â
Â
Â


Unlock God Mode in Windows
Windows 10 has many hidden features that can make a modifications and customization much easier and faster than having to toggle between...

echoudhury77
May 25, 20211 min read
Â
Â
Â


A Biologist and the First Ransomware Virus
Ransomware attacks have seen a huge increase in the last 15 years. The estimated $1 billion a year criminal industry that forces victims...

echoudhury77
May 18, 20213 min read
Â
Â
Â


DarkSide Ransomware Group Shutdown
In a recent development, a representative from a ransomware group known as REvil announced that the DarkSide ransomware group, who were...

echoudhury77
May 14, 20211 min read
Â
Â
Â


The Threat of the Third-Party: Supply Chain Attacks and the Weakest Link
It is often said that a chain is only as strong as its weakest link, and that holds true for a company’s cyber security. A business can...

echoudhury77
May 13, 20212 min read
Â
Â
Â


The Threat of Phone & E-mail Attacks on Restaurants
By Hunter McCurry This week’s article will cover attacks and scams executed on restaurants by cybercriminals and scammers. These types of...

echoudhury77
May 12, 20215 min read
Â
Â
Â


The Colonial Pipeline Hack
As you may have heard by now, Colonial Pipeline, the largest fuel pipeline in the United States, was hit with a devastating ransomware...

echoudhury77
May 12, 20212 min read
Â
Â
Â


PAM? Who's PAM?
Privileged Access Management, or PAM, is a system that securely manages the accounts of users with elevated permissions to sensitive...

echoudhury77
May 6, 20211 min read
Â
Â
Â


When China used LinkedIn for Espionage
Facebook has over 2.8 Billion users. LinkedIn has over 740 Million members. Twitter has over 350 Million users. Instagram has over 1...

echoudhury77
May 6, 20212 min read
Â
Â
Â


No C2 Required
Ransomware, something we at Firestorm Cyber called a pandemic two years ago, has evolved into a new highly effective and adaptable...

echoudhury77
Apr 30, 20212 min read
Â
Â
Â


All About Spyware
While you were browsing the internet or paying attention to the news you might have heard about something called spyware and it infecting...
kmaddox15
Apr 29, 20212 min read
Â
Â
Â


Password Managers, Should You Use Them?
Its no secret that remembering all your passwords for all your digital accounts is difficult. That’s why we see people fall into the bad...
kmaddox15
Apr 27, 20212 min read
Â
Â
Â


Recovering your Wi-Fi Password
Have you ever forgotten your Wi-Fi password? Earlier versions of Windows made it easy to see the password of a Wi-Fi network you've...

echoudhury77
Apr 23, 20212 min read
Â
Â
Â


W-2 Phishing Scam Targeting Tax Payers
With the 2021 tax season arriving, attackers are leveraging the event by trying to trick people into giving out login credentials....

echoudhury77
Apr 23, 20211 min read
Â
Â
Â


Restaurant & Small Business Cyber Security Threats
By Hunter McCurry The modern-day business world continues to move forward into the wireless era and the need for Wi-Fi networks is...

echoudhury77
Apr 19, 20216 min read
Â
Â
Â


Massive Exploit Found in Zoom Software
Pwn2Own is a yearly competition where security researchers can gather and find vulnerabilities in popular software used around the world....

echoudhury77
Apr 13, 20212 min read
Â
Â
Â


What is Fleeceware and How Can You Avoid It
Fleeceware has grown in the last couple of years and has raked in close to $400 million in revenue, but what is it? Fleeceware isn't a...

echoudhury77
Apr 2, 20212 min read
Â
Â
Â


Black Kingdom Ransomware Targeting Vulnerable Exchange Servers
(Image credit: https://www.bleepstatic.com/images/news/ransomware/b/blackkingdom/blackkingdom-ransom-note.jpg) A threat actor has been...

echoudhury77
Mar 24, 20212 min read
Â
Â
Â


PYSA Ransomware Targeting Schools
There recently has been a string of attacks targeting schools with a ransomware known has PYSA. PYSA will compromise a network through ...

echoudhury77
Mar 19, 20211 min read
Â
Â
Â
bottom of page