by Miguel Morales | Nov 6, 2020 | IT Support
Has a technician likely accessed your machine from a remote location?This is a hacker’s dream and can be done using Remote Access Trojan (RAT). They can take control of the PC using software created for this specific function. From downloading software,...
by Miguel Morales | Nov 5, 2020 | IT Support
Almost every penetration test starts with the finding of a low-hanging fruit powered by phishing techniques. This one (Evilginx) is capable of bypassing Google’s high-guarded security walls, but it doesn’t limit to work for other defenses. How does Evilginx...
by Miguel Morales | Nov 5, 2020 | IT Support
Google Project Zero is the elite group of white hat hackers reporting exploits. This time, they reported a zero-day vulnerability. Remember when we talked about Google’s Bug Bounty program? These (Project Zero) isn’t formed by rookies. Google’s Project...
by Miguel Morales | Nov 4, 2020 | IT Support
Shamoon, Black Energy, Destover, ExPetr/Not Petya, and Olympic Destroyer: All of these Wiper malware, and others like them, have a singular purpose of destroying systems and / or data, usually causing great financial and reputational damage to the victim companies. ...
by Miguel Morales | Nov 3, 2020 | IT Support
You should begin entering remote connections safely in 2022. This is because more and more vulnerabilities of network, server, device, and database access occur. There are steps we can take to make these remote connections more secure and less likely to cause a...