Optrics Insider – Pwn2Own Vancouver 2021, QNAP Vulnerability & 500M LinkedIn Users Being Sold Online

 Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss CanSecWest’s Pwn2Own whitehat competition in Vancouver, the latest QNAP vulnerability and the data from 500 million LinkedIN users that is now being sold online. Timecodes: 0:00 – Intro 0:21 – Today’s 3 topics 0:36 – Topic 1: Pwn2Own Vancouver 2021 4:52 – […]

Phishing Attacks Using PDF Files Have Skyrocketed

Phishing attacks using PDF files have spiked over the past year, according to researchers at Palo Alto Networks’ Unit 42. “From 2019-20, we noticed a dramatic 1,160% increase in malicious PDF files – from 411,800 malicious files to 5,224,056,” the researchers write. “PDF files are an enticing phishing vector as they are cross-platform and allow […]

Optrics Insider – 533M Facebook Accounts Leaked, FBI/CISA & Fortinet Vulnerability & Ubiquiti Hacked

Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss the data from 544 million Facebook accounts that was leaked, the joint FBI CISA Joint Cybersecurity Advisor regarding the known Fortinet FortiOS vulnerabilities as well as the Ubiquiti hack. Timecodes: 0:00 – Intro 0:24 – Today’s 3 topics 0:49 – Topic 1: 533 […]

Optrics Insider – Hackers Backdoor PHP, Samsung’s 512GB Memory Chip & Acer hit with $50M Ransomware

 Join Scott Young and Shaun Sturby from Optrics Engineering as they discuss how hackers breached the main Git repository to insert a backdoor into PHP, Samsung’s first 512GB DDR5 DRAM chip and how computer giant Acer was hit by a REvil ransomware attack where the threat actors are demanding the largest known ransom to […]

Microsoft Patch Tuesday March 2021 fixes 82 vulnerabilities, including 2 zero-days

With cybersecurity threats on the rise thanks to the pandemic, it’s essential to understand the importance of Patch Tuesday releases, and find ways to deploy them to remote endpoints efficiently. This Patch Tuesday, Microsoft has released fixes for 82 vulnerabilities, among which 10 are classified as Critical, and 72 as Important. Along with these vulnerabilities, […]

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into networks, no matter how many armed sentries you’ve deployed in and around your perimeter. The line between ransomware and a data breach is slowly fading. Threat actors prefer ransomware […]

KPMG: Cyber Security Risk Is Now No. 1 Threat To Growth

KPMG in the UK just released their CEO 2021 Outlook Pulse Survey where global leaders were asked about their 3-year outlook. CEOs of the world’s most influential companies are planning what a return to ‘normal’ will look like. Nearly half (45 percent) expect normality to resume in 2022, with only one-third (31 percent) anticipating a […]

Unraveling open port threats and enhancing security with port scanning tools

From exposing your network vulnerabilities to becoming a passageway for intruders, open ports can pose several risk vectors that threaten your network’s confidentiality, integrity, and availability. This is why it’s a best practice to close your open ports. To tackle the risks introduced by open ports, network admins rely on port scanning tools to identify, […]

Optrics Insider – MS Exchange Patch Update, F5 BIG-IP Update, Verkada Breach & Patch Tuesday Update

 Join Scott Young and Shaun Sturby from Optrics Engineering as they provide an update on the MS Exchange Hafnium Patch as well as discuss an F5 BIG-IP update you’ll want to apply, a breach with Verkada brand surveillance cameras and some things to look at with the latest Patch Tuesday Update Timecodes: 0:00 – […]

Integrate certificate life cycle management with enterprise MDM and boost your mobile ecosystem security

A huge portion of today’s corporate network is made up of mobile endpoints, such as laptops, tablet computers, and mobile phones. These are domain-joined and non-domain devices that require access to corporate assets to carry out everyday operations. To facilitate easy access and secure information exchanges between the mobile devices and corporate assets, IT teams […]