Faxploit – What should you know about it?

Some of us think of fax machines as a relic, but fields like healthcare and government still rely on faxes every day. Researchers have discovered serious vulnerabilities in fax machines that could let cybercriminals infiltrate any home or corporate network with just a fax number. Known as ‘Faxploit,’ the vulnerability research by Check Point’s Yaniv Balmas and Eyal Itkin illustrates how a hacker could easily exploit fax protocol and infiltrate a network. To begin, corporate…

What’s the biggest risk to your business?

What’s the biggest risk to your business? – Valuable infographs. While reviewing the Verizon 2018 Data Breach Investigations Report, there was some very interesting infographs that quickly explains cyber breaches for each industry. The graphs explains where most attacks occur such as External – outside of the network and Internal – inside the network; what type of breaches; and how they attacked.  Out of all of the industries listed here, financial is the only one…

5 Tips for protecting your network from cyber security threats

5 Tips for protecting your network from cyber security threats Today and probably forever, business owners and management like yourselves should focus on protecting their company from sophisticated cyber adversaries. For business owners data security can feel like a daunting task. In a recent research from Verizon found that 60% of the time, attacks can compromise an organization in minutes. To make matter worst, the costs associated with lost business as the result of a…

Security Alert – Expect increase in phishing attempts due to a large data leak.

Exactis, a marketing firm, left their databases exposed to the public that contained around 340 million records. These records included everything from email addresses, home addresses, phone numbers to details on purchasing history, religion, political preferences, pets, etc. However, no information such as credit card and social security information was leaked. What does this mean to you? Over the next few months you can expect an increase in very persuasive phishing attempts from malicious users…

What is phishing?

First, it is not fishing, its phishing. Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords. The information is then used to access important accounts and can result in identity theft and financial loss. Common Features of Phishing Emails Too…

How to protect yourself from phishing attempts?

If you aren’t 100 percent certain of the sender’s authenticity, don’t click on attachments or embedded links; both are likely to result in malware being installed. Instead, open a new browser window and type the URL directly into the address bar. Often a phishing website will look identical to the original, so check the address bar to confirm the address.   Similarly, never submit confidential information via forms embedded in or attached to email messages.…

FBI Issues SOHO Router Cyberattack Warning

United States Computer Emergency Readiness Team states: “Devices known to be affected by VPNFilter include Linksys, MikroTik, NETGEAR, and TP-Link networking equipment, as well as QNAP network-attached storage (NAS) devices. Devices compromised by VPNFilter may be vulnerable to the collection of network traffic (including website credentials), as well as the monitoring of Modbus supervisory control and data acquisition (SCADA) protocols. VPNFilter has a destructive capability that can make the affected device unusable. Because the malware…

CBM Technology named one of 2018 Tech Elite Solution Providers

CBM Technology Named One of 2018 Tech Elite Solution Providers by CRN® Tech Elite 250 list recognizes IT solution providers with deep technical expertise and premier certifications. CBM Technology announced today that CRN®, a brand of The Channel Company, has named to its 2018 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers,…

2018 Top IT Security Threats – Crime as a Service

Crime as a Service Crime as a Service is when a professional criminal or group of criminals develop advanced tools which are offered up for sale or rent to other criminal or criminal-wanna-be who are usually less experienced.  This is going to have a major effect in cybercrime because it lowers the bar for inexperienced actors to launch sophisticated cyber attacks and scams.  This allows helps accelerate attacks towards small businesses over enterprises, because small…

Critical Security Vulnerability – Meltdown & Spectre

  Update As of 2-8-2018 Meltdown-Spectre patching have been put on a slight hold for the moment.  Intel has not been able provide stable microcode updates.  The effort has been more complicated than Intel thought.  Intel has pulled back many patches due to the instability of the updates.  When the stable releases of microcode updates will come out is still unknown. CBM Technology security team is monitoring the activity for when Intel releases these patches.…

Beware: Holiday Phishing and Ransomware

Holiday Phishing and Ransomware Holiday Phishing and Ransomware   Hackers are ready for the holidays too! How much shopping do you plan on doing in the coming weeks? If you’re like most people, probably a lot! Well in that same trend, hackers are planning their own “shopping trips” on your dime. This year we have seen a major hike in Phishing and Ransomware Attacks. The percentage of Phishing attacks containing Ransomware is also rapidly increasing.…

WPA2 KRACK Wifi Vulnerability

WPA2 KRACK Wifi Vulnerability     We hope that most of you have heard of the recent discovery of the WPA2 KRACK Wifi Vulnerability. If you haven't, read more here. Look at the image above and you will see several pictures from sites showing you how to hack the WPA2 network "easily." So the information is at the fingertips of the hackers, and thinking you're protected could cost you more than the time it would…