by Thirtyseven4 Staff | Feb 6, 2023 | Internet Security, Thirtyseven4 Endpoint Security, Virus Threats
Cybersecurity Predictions for 2023 (Part III) – Email-based Attacks Continue to Increase Since the debut of the Melissa virus in early 1999, the exploitation of email has risen yearly with ever-increasing malicious cyber-savvy, causing the (alarming) spread of...
by Thirtyseven4 Staff | Jan 23, 2023 | Internet Security, Thirtyseven4 Endpoint Security, Uncategorized, Virus Threats
Cybersecurity Predictions for 2023 (Part II) – Rise in Crime As A Service (CaaS) Crime As A Service (CaaS) is a nefarious operation of cybercriminals developing and marketing sophisticated services, knowledge, or tools in order to sell them to novice attackers,...
by Thirtyseven4 Staff | Jan 9, 2023 | Internet Security, Thirtyseven4 Endpoint Security, Uncategorized, Virus Threats
Cybersecurity Predictions for 2023 (Part 1) – Rise in Vishing Attacks Vishing (Voice phishing) is a social engineering attack where the attacker calls the victim in an effort to extract information. Thirtyseven4 EDR Security Threat Labs have seen a spike in the...
by Thirtyseven4 Staff | Dec 15, 2021 | Internet Security, Thirtyseven4 Endpoint Security, Uncategorized, Virus Threats
New Apache Log4j ‘Log4Shell’ Zero-Day Being Exploited in the Wild The critical zero-day vulnerability (CVE-2021-44228) exploiting Apache Log4J, the popular java open source logging library used in countless worldwide applications, has been discovered in-the-wild....
by Thirtyseven4 Staff | Apr 1, 2021 | Internet Security, Thirtyseven4 Endpoint Security, Uncategorized, Virus Threats
FBI Alert Number: CU-000143-MW “Mamba” is a modified Ransomware that weaponizes DiskCryptor (an open-source full disk encryption system for Microsoft Windows). Once Mamba enters into the system it installs the DiskCryptor encryption service and restarts the system to...
by Thirtyseven4 Staff | Mar 1, 2021 | Internet Security, Thirtyseven4 Endpoint Security, Uncategorized, Virus Threats
Winning a contest is a rush. If it’s ever happened to you, then you know. We know this and businesses know this. And cyber-criminals also know this. Join me as we journey through the steps of an attempted hack that was foiled (hopefully before any...