Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Bluejacking vs Bluesnarfing: Exploring Bluetooth Hacking Variations.

Imagine walking down the street, innocently scrolling through your phone, completely unaware that someone nearby is attempting to hijack your Bluetooth connection. It sounds like a scene straight out of a spy movie, right? Well, this kind of covert hacking, known as bluejacking and bluesnarfing, is a growing concern in today’s digital age.

From Shadow to Guardian: The Journey of a Hacker-Turned Hero

In the ever-evolving landscape of cybersecurity, the line between the defenders and attackers often blurs, with skills transferable across both arenas. It’s a narrative not unfamiliar to many in the cybersecurity community: the journey from black hat to white hat, from outlaw to protector. In the 15th episode of Cato Networks’ Cyber Security Master Class, hosted by Etay Maor, Senior Director of Security Strategy, we had the privilege of witnessing such a transformative story unfold.

Hackers Get Hacked Back!

Have you ever wondered how hackers get hacked back? Today we detail the story of how this is possible! Did you learn something from this video? Make sure to comment it below! For more information about SecurityScorecard, you can find us here: SecurityScorecard is the global leader in cybersecurity ratings and the only service with over 12 million companies continuously rated. The company is headquartered in New York and operates in 64 countries around the globe.

Social engineering: Hacking minds over bytes

In this blog, lets focus on the intersection of psychology and technology, where cybercriminals manipulate human psychology through digital means to achieve their objectives. Our world has become more interconnected over time, and this has given rise to an entirely new breed of criminal masterminds: digital criminals with deep psychological insights who use technology as the ultimate battlefield for social engineering activities.

Can You Get Hacked by Replying to a Scam Text?

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you. According to the Federal Trade Commission (FTC), Americans lost a total of $330 million from scam texts in 2022, making scam texts a serious threat to your online security. Continue reading to learn how to spot scam texts and the common scam text tactics that scammers use.

Chicago Medical Center Notifies 216k+ Patients Following Hacker Data Breach

Community First Medical Center (CFMC) is a medical and nursing facility that serves Chicagoland and Illinois broadly. They employ over 300 individuals who preside over a 299-bed hospital campus. Originally named Our Lady of the Resurrection Hospital, CFMC provides community-focused healthcare, diagnostics, and treatments. If you have received services from CFMC, your private information might have been stolen in a recent data breach.