top of page
Search
![Crypto User Loses Over $100K in Bitcoin While Transferring His Wallet](https://static.wixstatic.com/media/f5155d_45b89928723445ec8d2cc537091172fc~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/f5155d_45b89928723445ec8d2cc537091172fc~mv2.webp)
Chris Mallazzo
Jan 9, 20212 min read
Crypto User Loses Over $100K in Bitcoin While Transferring His Wallet
A bitcoin user has shared his story of how he lost more than $100,000 in BTC during a wallet transfer. The bitcoiner attempted to...
10 views0 comments
![](https://static.wixstatic.com/media/f5155d_30907344216d499b8e2f53b056fdd761~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_30907344216d499b8e2f53b056fdd761~mv2.webp)
![FTC's Zoom Deal Signals Commitment to Security Enforcement](https://static.wixstatic.com/media/f5155d_30907344216d499b8e2f53b056fdd761~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_30907344216d499b8e2f53b056fdd761~mv2.webp)
Chris Mallazzo
Jan 6, 20215 min read
FTC's Zoom Deal Signals Commitment to Security Enforcement
The U.S. Federal Trade Commission is making good on a resolution to strengthen its enforcement of security deficiencies occurring in...
13 views0 comments
![](https://static.wixstatic.com/media/f5155d_2a087ee330ef4cf0b09386f393a13208~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_2a087ee330ef4cf0b09386f393a13208~mv2.webp)
![CISA Insights on Ongoing APT Cyber Activity Behind SolarWinds Attack](https://static.wixstatic.com/media/f5155d_2a087ee330ef4cf0b09386f393a13208~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_2a087ee330ef4cf0b09386f393a13208~mv2.webp)
Chris Mallazzo
Jan 6, 20213 min read
CISA Insights on Ongoing APT Cyber Activity Behind SolarWinds Attack
DHS CISA launched a resource site and shared insights into the ongoing, massive APT cyber activity, brought on by the SolarWinds...
15 views0 comments
![](https://static.wixstatic.com/media/f5155d_8703670a19634eb0a25660075fdcb6cf~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_8703670a19634eb0a25660075fdcb6cf~mv2.webp)
![Fed Cybersecurity Advisory Alerts to Abuse of Authentication Mechanisms](https://static.wixstatic.com/media/f5155d_8703670a19634eb0a25660075fdcb6cf~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_8703670a19634eb0a25660075fdcb6cf~mv2.webp)
Chris Mallazzo
Jan 1, 20213 min read
Fed Cybersecurity Advisory Alerts to Abuse of Authentication Mechanisms
The Russian hackers behind the SolarWinds’ attack have claimed multiple victims in the government sector, with the latest efforts...
9 views0 comments
![](https://static.wixstatic.com/media/f5155d_7c29693fe35a4c91a8de10c28b1f79c1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_7c29693fe35a4c91a8de10c28b1f79c1~mv2.webp)
![FBI, HHS Alert to COVID-19 Vaccine Fraud Schemes Aimed at Data Theft](https://static.wixstatic.com/media/f5155d_7c29693fe35a4c91a8de10c28b1f79c1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_7c29693fe35a4c91a8de10c28b1f79c1~mv2.webp)
Chris Mallazzo
Dec 31, 20203 min read
FBI, HHS Alert to COVID-19 Vaccine Fraud Schemes Aimed at Data Theft
Cybercriminals are again preying on COVID-19 fears, leveraging a range of fraud schemes tied to the vaccine rollout and designed to steal...
6 views0 comments
![How SpaceCycles LLC & StrikeForce Technologies can help companies with the SOLARWINDS data breach!](https://static.wixstatic.com/media/f5155d_e978f5af59fe495a9e44c12f8a6fe6b6~mv2.png/v1/fill/w_275,h_183,fp_0.50_0.50,q_95,enc_auto/f5155d_e978f5af59fe495a9e44c12f8a6fe6b6~mv2.webp)
Chris Mallazzo
Dec 31, 20202 min read
How SpaceCycles LLC & StrikeForce Technologies can help companies with the SOLARWINDS data breach!
Sometime in September 2020, two ProtectID (developed by StrikeForce Technologies Inc.) customers reported a strange issue. Their...
74 views0 comments
![Federal prosecutors accuse Zoom Exec of working with Chinese Gov to surveil and suppress video calls](https://static.wixstatic.com/media/f5155d_713889712ade42518615b6c08a829856~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/f5155d_713889712ade42518615b6c08a829856~mv2.webp)
Chris Mallazzo
Dec 19, 20207 min read
Federal prosecutors accuse Zoom Exec of working with Chinese Gov to surveil and suppress video calls
The case is a stunning blow for the $100 billion video-call giant and raises questions about how the California-based company protects...
38 views0 comments
![](https://static.wixstatic.com/media/f5155d_792695fad94a4fa7b9a2549cd7bdd316~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_792695fad94a4fa7b9a2549cd7bdd316~mv2.webp)
![Phishing Campaigns Targeting Office 365 Credentials, Spoofing Exchange](https://static.wixstatic.com/media/f5155d_792695fad94a4fa7b9a2549cd7bdd316~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_792695fad94a4fa7b9a2549cd7bdd316~mv2.webp)
Chris Mallazzo
Dec 17, 20203 min read
Phishing Campaigns Targeting Office 365 Credentials, Spoofing Exchange
A recent spear-phishing campaign is actively targeting Microsoft Office 365 users in an effort to steal user credentials, while another...
11 views0 comments
![Phishers bypass Microsoft 365 security controls by spoofing Microsoft.com](https://static.wixstatic.com/media/f5155d_1c80506d120b4ae9902be99a7efce9ed~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/f5155d_1c80506d120b4ae9902be99a7efce9ed~mv2.webp)
Chris Mallazzo
Dec 11, 20202 min read
Phishers bypass Microsoft 365 security controls by spoofing Microsoft.com
A domain spoofing email phishing campaign that very convincingly impersonates Microsoft and successfully tricks legacy secure email...
12 views0 comments
![](https://static.wixstatic.com/media/f5155d_501736a1c8334a44b938895c0b959b5b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/f5155d_501736a1c8334a44b938895c0b959b5b~mv2.webp)
![What is Identity Theft?](https://static.wixstatic.com/media/f5155d_501736a1c8334a44b938895c0b959b5b~mv2.jpg/v1/fill/w_275,h_183,fp_0.50_0.50,q_90,enc_auto/f5155d_501736a1c8334a44b938895c0b959b5b~mv2.webp)
Chris Mallazzo
Dec 3, 20206 min read
What is Identity Theft?
Identity Theft is the illegal use of someone else’s personal identifiable information (PII) with the intent to commit fraud or gain...
14 views0 comments
![](https://static.wixstatic.com/media/f5155d_cd04d51564544524babb6dee5c6154a0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_cd04d51564544524babb6dee5c6154a0~mv2.webp)
![BBB Scam Alert: That Zoom invite is really a phishing scam](https://static.wixstatic.com/media/f5155d_cd04d51564544524babb6dee5c6154a0~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_cd04d51564544524babb6dee5c6154a0~mv2.webp)
Chris Mallazzo
Nov 30, 20203 min read
BBB Scam Alert: That Zoom invite is really a phishing scam
Thanks to the global pandemic keeping people at home, the popular video conferencing platform Zoom has seen usage grow exponentially in...
19 views0 comments
![](https://static.wixstatic.com/media/f5155d_ce8fcd875fe743649ab52bb33140b6c8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_ce8fcd875fe743649ab52bb33140b6c8~mv2.webp)
![Hackers Can Grab Passwords By Watching Your Shoulders Move On Zoom](https://static.wixstatic.com/media/f5155d_ce8fcd875fe743649ab52bb33140b6c8~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_ce8fcd875fe743649ab52bb33140b6c8~mv2.webp)
Chris Mallazzo
Nov 26, 20204 min read
Hackers Can Grab Passwords By Watching Your Shoulders Move On Zoom
Hacking threats often come from unexpected directions; this latest attack method is a case in point. SEE HOW to PROTECT your VIDEO Calls...
14 views0 comments
![](https://static.wixstatic.com/media/f5155d_41839d979542413aa8e4150ca4d3892b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_41839d979542413aa8e4150ca4d3892b~mv2.webp)
![Blackbaud Ransomware Hack Affects 657K Maine Health System Donors](https://static.wixstatic.com/media/f5155d_41839d979542413aa8e4150ca4d3892b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_41839d979542413aa8e4150ca4d3892b~mv2.webp)
Chris Mallazzo
Nov 25, 20204 min read
Blackbaud Ransomware Hack Affects 657K Maine Health System Donors
A Blackbaud ransomware attack breached the data of 657,392 donors to Northern Light Health Foundation and other entities; malware, a...
11 views0 comments
![](https://static.wixstatic.com/media/f5155d_c8662bfacbd54c4fa502c077e63fc20b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_c8662bfacbd54c4fa502c077e63fc20b~mv2.webp)
![Zoom Reaches Settlement with FTC Over Misleading Security Practices](https://static.wixstatic.com/media/f5155d_c8662bfacbd54c4fa502c077e63fc20b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_c8662bfacbd54c4fa502c077e63fc20b~mv2.webp)
Chris Mallazzo
Nov 11, 20203 min read
Zoom Reaches Settlement with FTC Over Misleading Security Practices
The use of Zoom videoconferencing skyrocketed amid the COVID-19 crisis, which spotlighted several security risks and concerns. The FTC...
17 views0 comments
![](https://static.wixstatic.com/media/f5155d_06541002ec1a4db28a9ef37002046d52~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_06541002ec1a4db28a9ef37002046d52~mv2.webp)
![Security Incident Drives Sonoma Valley Hospital to EHR Downtime](https://static.wixstatic.com/media/f5155d_06541002ec1a4db28a9ef37002046d52~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_06541002ec1a4db28a9ef37002046d52~mv2.webp)
Chris Mallazzo
Oct 31, 20204 min read
Security Incident Drives Sonoma Valley Hospital to EHR Downtime
A hacking incident, phishing attack, and another Blackbaud breach victim complete this week’s breach roundup.
7 views0 comments
![](https://static.wixstatic.com/media/f5155d_24b49de7b7d74edd932afd3b7fee3260~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_24b49de7b7d74edd932afd3b7fee3260~mv2.webp)
![Combating Medical Identity Theft](https://static.wixstatic.com/media/f5155d_24b49de7b7d74edd932afd3b7fee3260~mv2.jpg/v1/fill/w_454,h_291,fp_0.50_0.50,q_90,enc_auto/f5155d_24b49de7b7d74edd932afd3b7fee3260~mv2.webp)
Chris Mallazzo
Oct 21, 20204 min read
Combating Medical Identity Theft
A consumer’s medical identity information can be compromised through scams, phishing attacks (fake medical offers, etc.)
8 views0 comments
![](https://static.wixstatic.com/media/f5155d_7bfaac58559f497fb2f3ddd4b54d4402~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_7bfaac58559f497fb2f3ddd4b54d4402~mv2.webp)
![Bitcoin Prices Climb To Highest Since Early September](https://static.wixstatic.com/media/f5155d_7bfaac58559f497fb2f3ddd4b54d4402~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_7bfaac58559f497fb2f3ddd4b54d4402~mv2.webp)
Chris Mallazzo
Oct 17, 20203 min read
Bitcoin Prices Climb To Highest Since Early September
Bitcoin prices rallied today, enjoying some notable gains and reaching their loftiest value in more than five weeks.
7 views0 comments
![](https://static.wixstatic.com/media/f5155d_5d7054a509384774b02816ce70e7db83~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_5d7054a509384774b02816ce70e7db83~mv2.webp)
![FBI, CISA Warn APT Hackers Chaining Vulnerabilities in Cyberattacks](https://static.wixstatic.com/media/f5155d_5d7054a509384774b02816ce70e7db83~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_5d7054a509384774b02816ce70e7db83~mv2.webp)
Chris Mallazzo
Oct 15, 20204 min read
FBI, CISA Warn APT Hackers Chaining Vulnerabilities in Cyberattacks
Advanced persistent threat (APT) hackers are targeting government networks, critical infrastructure, and election organizations....
10 views0 comments
![](https://static.wixstatic.com/media/f5155d_088a2adf927c466297ebf3356708c585~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_088a2adf927c466297ebf3356708c585~mv2.webp)
![3 Key Entry Points for Leading Ransomware Hacking Groups](https://static.wixstatic.com/media/f5155d_088a2adf927c466297ebf3356708c585~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_088a2adf927c466297ebf3356708c585~mv2.webp)
Chris Mallazzo
Oct 15, 20205 min read
3 Key Entry Points for Leading Ransomware Hacking Groups
Ransomware attacks rapidly increased in sophistication and impact this year, with healthcare as a prime target.
6 views0 comments
![](https://static.wixstatic.com/media/f5155d_b155ad077f9f404b9bb6832fcc19e5ce~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/f5155d_b155ad077f9f404b9bb6832fcc19e5ce~mv2.webp)
![Ransomware Hacking Groups Post Data from 5 Healthcare Entities](https://static.wixstatic.com/media/f5155d_b155ad077f9f404b9bb6832fcc19e5ce~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/f5155d_b155ad077f9f404b9bb6832fcc19e5ce~mv2.webp)
Chris Mallazzo
Oct 1, 20204 min read
Ransomware Hacking Groups Post Data from 5 Healthcare Entities
NetWalker, REvil, SunCrypt, and Pysa, or Mespinoza, ransomware hacking groups posted data allegedly stolen from five healthcare entities....
7 views0 comments
bottom of page