3 Million Credit Cards Exposed: The Latest Data Breach Hitting Customers

3 Million Credit Cards Exposed: The Latest Data Breach Hitting Customers

The financial nightmare of millions of customers recently became true when the sensitive details of more than 3 million credit cards were exposed online by hackers. Dickey’s Barbecue Pit, the country’s largest barbecue chain, was hit by hackers that ended up stealing valuable data from the company’s vulnerable systems and selling everything online. Gemini Advisory, […]

CCTV/Camera Hacking: Risks and Solutions

CCTV/Camera Hacking: Risks and Solutions

Most CCTV systems are vulnerable by default. By installing cameras, you are automatically opening a window for the world, especially when proper security actions aren’t taken.  There are serious risks linked to CCTV hacking. We have seen it many times, with hackers accessing private IP cameras and violating the privacy of employees and customers, stealing […]

Are Smart Devices Exposed to Hacking at Buildings and Hotels?

Are Smart Devices Exposed to Hacking at Buildings and Hotels?

Smart devices are becoming an intrinsic part of modern buildings. We are increasingly seeing how an abundance of Internet-ready devices are transforming, mostly for the best, the way our facilities operate, including residential, hospitality, and commercial environments. However, the steady-paced implementation of such technologies in our buildings also comes with considerable challenges. Malicious agents have […]

Life Loss as a Consequence of Cybercrime: What Do You Need to Know?

Life Loss as a Consequence of Cybercrime: What Do You Need to Know?

Ransomware is a powerful resource used by malicious agents to blackmail individuals and organizations for a ransom. And with bigger, more important victims, the criminals could get heftier rewards, right? The logic behind this statement makes sense. If a malicious party successfully attacks a powerful institution, in charge of sensitive or critical activities, the criminal […]

Working from Home: How to Make It Safe?

Working from Home: How to Make It Safe?

The idea of working from home, a methodology now imposed by the pandemic, is something most businesses should get comfortable with. For many years, there has been resistance against the model, ignoring the implications of its implementation. Now, after its sudden enforcement, something that no one could possibly predict in 2019, thousands of businesses around […]

Holdmayr International AG’s Data Leak Caused by CLOP Ransomware

Holdmayr International AG’s Data Leak Caused by CLOP Ransomware

During the past few weeks, Holdmayr International AG has been suffering the consequences of a dramatic case of ransomware. Holdmayr, which is a renewed logistics company from Austria, employs more than 2,000 workers and has an annual revenue of over 300 € million. These numbers may also represent the extraordinary volume of sensitive data that […]

How to Meet Tighter Cybersecurity Budgets with Consolidated Tools

In the past few months, something curious happened in the world of cybersecurity. As COVID-19 forced organizations to send their professionals to work remotely, greater needs in cybersecurity arose. But also, concurrently, these organizations found themselves short of cash, limited when investing in the improvement of their processes. With a remote workforce, new challenges in […]

How to Protect OT/ICS Environments at a Water Facility?

Water cybersecurity

In the past decade, disclosed cyberattacks experienced by water facilities and other utility companies have shown us the consequences of not being prepared. Operational Technology (OT) and Industrial Control Systems (ICS) comprehend fragile instruments that often are attractive targets for cybercriminals, being aware that often their cyber hygiene is incomplete and outdated mechanisms used in […]

Why Protect ICS?

ICS cybersecurity

Industrial control systems are a quintessential part of our productive engines. Their development represented a revolution for industrial processes as organizations gained control over every detail, skyrocketing efficiency. Shortly after their implementation, cybersecurity issues arose. Malicious parties saw major opportunities in cracking their way into these infrastructures and profit at the expense of causing serious […]