top of page

INSIGHTS & RESOURCES


So You’re Still Not Concerned About Cybersecurity – Here’s Why You Should Be
Every week we offer news in this space about a current cybersecurity threat, or an emerging issue that people need to be aware of in the field. It’s all good information and if you haven’t followed it to date, I encourage you to read some of the latest here . But for today’s entry, let me ask you a few questions. I have a sense that a lot of companies still don’t think cybersecurity concerns are for them, so you’re not acting on it. So I’d like to know: · Is most of you
michelle1593
8 hours ago2 min read


How North Koreans Might Be Tricking Your Employees Into Helping Them Cyberattack You
While some Americans are nervous about North Korea getting the bomb, it turns out they have already found ways to attack some of us in North America. They’re doing it through a state-sponsored cyberattack group known as PurpleBravo – and their weapon of choice is phony job interviews. This gets a little twisted, so we’ll try to walk you through it. The campaign is known as the Contagious Interview cluster. PurpleBravo has targeted more than 3,000 individual IP addresses – mai
michelle1593
Jan 262 min read


The Cybersecurity Threat to Humanoid Robots. . . And Why It Should Matter To You
Can you and your business take any action steps from the possibility of cyberattacks on humanoid robots? Oh yes, you certainly can! And by the time you’ve read this, you’ll probably be looking for a way to take these steps as quickly as possible. You’ve probably seen concepts of AI-powered humanoid robots becoming a more common part of life, business and modern culture. Maybe it’s the fulfillment of the vision in the Terminator films (probably without the sunglasses and the m
michelle1593
Jan 133 min read


Uh-Oh: AI Adoption is Outpacing AI Security Measures By A Lot
By Dave Carey It’s an old story for those of us who focus on cybersecurity. When a new technology emerges as the absolute thing of the moment, people rush to adopt it so quickly that implementation runs way ahead of security controls. A good example is the digitization of the trucking industry, which was behind the curve on that front for many years and suddenly, as a collective industry, moved with lightning speed to embrace everything from advanced TMS platforms to routing
michelle1593
Jan 73 min read


China-Backed Hackers Exploiting Routers to Steal Data and Gather Intelligence
By Dave Carey If you’ve ever wondered how secure routers are, you won’t be surprised to know that hackers have always seen them as a vulnerability to be exploited. Certain groups backed by the Chinese government – with names such as Salt Typhoon and GhostEmperor – have made a specialty out of exploiting large, backbone routers to gain long-term access to organizations’ systems. Now we’re not really talking here about the router you keep next to your couch in your living room
michelle1593
Dec 22, 20252 min read


Be Warned: Hackers Have Commandeered HexStrike AI, Intended as a Defensive Tool, And Are Using It To Launch Attacks
By Dave Carey Occasionally tools designed to protect against cyberattacks end up being commandeered by dark web hackers and used against the good guys. A current example of this is HexStrike AI, which was originally developed as a defender platform for security exercises. The idea was that the tool would integrate with AI models such as GPT, Claude and Copilot – allowing the AI models to detect malicious intent and shoot down attacks on their own initiative. But it didn’t tak
michelle1593
Dec 18, 20252 min read


If Addressing Cybersecurity In Your Company Intimidates You . . . Just Start
By Dave Carey If you started a business on Main Street 50 years ago, there’s something you would have certainly done on the very first day: You would have made sure you can lock your door. That doesn’t necessarily mean you would eliminate every possible vulnerability that could arise in the world of 1975. You might still, at some point, consider alarm systems, security personnel or other such measures. But on the first day, you would absolutely not close up and head for home
michelle1593
Dec 15, 20253 min read


Small-to-Midsize Health Practices: You Must Protect Your Patients’ Records From Cyberattacks
By Dave Carey Here is a tough question for health care providers: How would you tell your patients that their medical records had been hacked and exposed? Because as much as you want to think this would not happen to you, the trends in the industry in recent years are not on your side. If you own or operate a health practice of any kind, you certainly are in possession of a great many patient records. You know how critical it is to keep those records secure, not only because
michelle1593
Dec 13, 20253 min read


How ChatGPT’s New Browser Could Turn Your System Against You
Fortune reported this week that Open AI’s new browser, known as ChatGPT Atlas, is being viewed in the cybersecurity community as having the potential to produce cyberattacks against users – by using the AI prompts to give your browser nefarious instructions. ChatGPT Atlas, which Open AI hopes can compete with Google Chrome and Microsoft Edge, is enabled so users can get information, ideas and action from prompts they enter. Users can even have the browser go into “agent mod
michelle1593
Dec 11, 20253 min read


Recently Patched Microsoft Teams Flaw Could Have Impersonated Your Boss
Imagine this: You’re on a Microsoft Teams call with others in your company, and on pops your boss with directives that seem awfully unusual to you. What he’s telling the team to do is reckless and completely contrary to the way the company normally does business. But there he is – the boss – right there on live video, clearly giving you the instruction. What choice do you have but to follow it? Except that it wasn’t your boss at all. It was a deep fake that mimicked both his
michelle1593
Dec 9, 20253 min read


Did the FCC Make Us All Less Safe By Eliminating Cybersecurity Rules for Telecoms?
The short answer is probably not, but it’s a matter that bears watching. If you haven’t been following this, here’s what’s happened: At the end of the Biden Administration, the Federal Communications Commission imposed tough new requirements for telecommunication companies to shore up their cybersecurity infrastructure and practices. In doing so, they cited the 1994 Communications Assistance for Law Enforcement Act, which requires them to “secure their networks from unlawful
michelle1593
Dec 8, 20252 min read


Congressional Budget Office Still Reeling From Cyberattack
I want you and your business to take every precaution against cyberattacks, which is why I do everything I do to help you with that. But if you have had a breach, I don’t want you to feel like a schmuck over it. After all, the Congressional Budget Office is still struggling to come back from an attack that hit it last week . If the U.S. Congress isn’t ready for a cyberattack . . . er, come to think of it, maybe we shouldn’t be too surprised. It’s a big, high-profile target a
da610
Dec 3, 20253 min read
New Report: Cyberattackers Are Exploiting Their Access More Quickly Than Ever
Uh oh. Cyberattackers are getting faster. That means you have to do the same. A recent report from VulnCheck demonstrates a growing...

Dave Carey
Aug 11, 20252 min read


Cyberattackers Breach Microsoft's SharePoint, Which Means No One Is Safe Without Effective Measures In Place
Two common misconceptions about cybersecurity were ripped to shreds by a recent event – the breaching of Microsoft's SharePoint software....

Dave Carey
Aug 4, 20253 min read


If Cisco Can Blunder Like This, No Company Can Take Its Cybersecurity for Granted
As much as we talk about the need for constant vigilance, frequent security patches, multifactor authentication and so much else – there...

Dave Carey
Jul 14, 20253 min read
Logistics Industry, You Are a Huge Cyber Target: But the Imperative is for Action, Not Fear
I'll start with the good news: The steps trucking companies need to take to protect themselves from cyberattacks are not that difficult,...

Dave Carey
Jun 18, 20252 min read


The Latest: Malicious Excel Files, Stolen Cookies . . . and Fake HTMLs Targeting Chrome Users
Every week there are new attacks emerging that threaten industries throughout the world. At CyberSynergies, we monitor these developments...

Dave Carey
Jun 18, 20252 min read


Case Study: Real-Time Threat Detection System for a Nationwide Trucking Company
Fine-tuning and enhancing existing setups has led to successful configuration recommendations increasing from 50% to over 90%.

Dave Carey
Jan 21, 20253 min read


DMARC: A Simple and Powerful (Yet Largely Unknown) Weapon Against Email Scams
While the business community heavily relies on email, cyberattackers may depend on it even more. It’s often their primary entry point for...

Dave Carey
Dec 24, 20243 min read
Insights & Resources


Strengthen Your Cyber Defense:
Get our Free Cybersecurity Checklist Today
bottom of page
