Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Juice Jacking: Why Using Public USB Charging Stations Can Lead to Identity Theft

We've all been there: You're away from home when you notice your phone's battery is dangerously low. For most people, the quick solution is to find a public charging station and restore their battery power. However, this may not be the safest option!

The Dark Side of Online Bookings: Infostealers and Phishing in the Hospitality Industry

The high profile MGM Resorts hack by ransomware group ALPHV/BlackCat has served as a wake up call to the hospitality industry, demonstrating that the industry is a lucrative target for cybercriminals. The hack was hugely impactful to MGM making for sensational headlines in mainstream media, however what struck security experts were the social engineering methods used by the threat actors and how effective they were in bypassing security controls and technologies.

The Value of Modernizing Multifamily Security: Centralization and Prop Tech

Keeping your residents and assets safe presents complex challenges, often with priorities that seem to be at odds. Buildings need robust security, yet access must be as smooth and convenient as possible for residents. Residents desire easy entry for deliveries, dog walkers, and scheduled services, while also having peace of mind that their units are secure.

Top 5 Benefits of Remote Screen-Casting iOS Work Devices

Let’s explore how remote screen-casting on iOS devices can revolutionize your business operations. From enhancing IT support efficiency to improving employee training and ensuring compliance, discover why integrating screen-casting tools is a strategic move for modern enterprises.

PDFast But Luckily Not So Furious

Beginning in early April 2025, Kroll has observed a large wave of malicious activity surrounding "PDFast" software. Initial access for the campaign appeared to begin either through a new install of the application, through drive-by compromise on the site pdf-fastcom, or via pre-installed versions of the application that have since been updated with a malicious version.

Analyzing Advanced Persistent Threats (APTs) in Threat Intelligence for Government Agencies

It doesn’t matter which industry you belong to; cybersecurity is one of the most important factors you should always be cautious about. When it comes to government agencies, the stakes are even higher! Government agencies are prime targets for cybercriminals, including state-sponsored actors and APT groups. These APT attackers often utilize Advanced Persistent Threats (APTs), which are designed to infiltrate target networks and gain access to sensitive data over extended periods.