Security Archives - Velox Systems

Malicious Actors Target Construction Through Software Infiltration

  Malicious actors target construction through software infiltration. These hackers are undergoing this attack through the infiltration of FOUNDATION accounting software. This is a common accounting tool in use by many contractors. The first signs of this malicious activity were September 14, 2024 by Huntress. The cybersecurity firm notes 35,000 brute-force login attempts before a […]

Microsoft Update Unveils Three Security Flaws

  A recent Microsoft update unveils three security flaws. These emerged after the September 2024 patch update. The 3 security flaws are now in use by malicious actors. These flaws can lead to such faults as bypassing important security features that block Microsoft Macros from running. The target would be sent a specially crafted file […]

New WikiLoader Malware Attack Utilizing Fake GlobalProtect VPN Software

  In recent malware news, there is a new WikiLoader malware attack utilizing fake GlobalProtect VPN software. This new campaign spoofs Palo Alto Networks’ GlobalProtect VPN software to deliver a variant of the WikiLoader loader through a search engine optimization (SEO) tactic. First observed in June 2024, this campaign marks a shift from traditional phishing […]

Why Endpoint Detection and Response is Essential

  Endpoint detection and response (EDR) has become the new cybersecurity buzzword. Why is endpoint detection and response essential? Hackers constantly evolve their tactics to bypass traditional security measures like antivirus software. That’s where Endpoint Detection and Response (EDR) steps in as a game-changer for modern cybersecurity. Here’s why EDR is essential: What is EDR? […]

Password Managers Are Your New Best Friend

  In today’s digital age, we manage countless online accounts, each with a unique password. While your browser’s built-in password manager may seem convenient, it carries significant risks. This can make cybersecurity a nightmare for your organization. However, password managers are your new best friend. Dedicated password managers offer superior security. Here’s why relying solely […]

Cybersecurity Firm CrowdStrike’s Window’s Update: Global Disruption

    Cybersecurity firm CrowdStrike underwent a faulty Window’s update which led to massive global business disruptions. This incident affected industries such as healthcare, retail, and airfare. What exactly happened, and should you be concerned? Let’s break it down.   What happened with the Window’s Update? Cybersecurity firm CrowdStrike’s recent Windows Update for its customers […]

Unveiling Social Engineering: Digital Deception

  You’ve seen the news about catastrophic cyber breaches, malware, and ransomware attacks. But are you familiar with social engineering? This term is becoming the new digital “open sesame” into your organization, as attackers manipulate users to gain access. In other words, social engineering is a new cybersecurity nightmare. But there is light at the […]

Disruptive CDK Cyberattack Catastrophic For US Auto Industry

At the beginning of this week, the U.S. auto industry was thrown into turmoil due to a sweeping software outage caused by a cyber-attack on CDK, the primary technology provider for more than 15,000 retail locations. This disruption significantly impacted dealer management systems crucial for transaction completion. These included profitability tracking and employee compensation management […]

Common Types of Cyber Attacks

Modern businesses need to be able to prevent cyber security breaches at any time. No matter what industry sector they operate in. However, the training and equipment to combat cyber threats often requires more time and effort than a typical business can spare. This is why an experienced IT company is so critical. It is […]

How Quickly Cyber Criminals Can Take Over

In a recent BBC article, they explain how easy it is for cyber criminals to take over a vulnerable server. And don’t think they aren’t targeting little guys, because they are using automated tools, you’re just as vulnerable as a Fortune 100 company for many attacks. A test was done by a company that does […]