Intelecis
  • Facebook
  • LinkedIn
  • RSS
  • 949-259-0750
  • 949-259-0750

Blog

Microsoft Expanding Fight Against Macros Based Malware

Macros have been a simple, effective means of spreading malware since the 1990’s, and some hackers still rely on them heavily to ensnare and infect unsuspecting users. It’s a long standing issue ...

Massive Security Camera Hack Hits Some Corporate Businesses

A large US hacker collective claimed credit for something you may not have heard of yet called “#OperationPanopticon.” According to the group behind the attack, they compromised a high level administrator account ...

Another Malware Evolves To Gain Access To More Systems

One of the more disturbing trends this year is that worms are becoming popular among the hackers of the world again. We’ve seen a handful of new malware strains introduced in recent ...

People Using Mobile Data Instead Of Internet Service Providers

The ongoing pandemic has impacted daily life in the United States in a number of ways, some predictable and others surprising. On the predictable side, when tens of thousands of employees were ...

Now Hackers Are Attacking Exchange Server Vulnerabilities

In early January of this year (2021), Microsoft informed security expert Brian Krebs that the company found four zero-day security flaws in their Exchange Server. Those flaws were actively being exploited by ...

New Ryuk Ransomware Function Spreads Across Networks Quickly

In terms of ransoms paid, Ryuk is the most successful strain of ransomware in use today, having netted an estimated $150 million for the group behind the malicious code. According to a ...

New Ransomware Strains Have Researchers On Their Toes

Recently, researchers have discovered two new ransomware strains, dubbed “AlumniLocker” and “Humble”, both of which have very different ways of doing what they do. This highlights the ongoing development and diversification of ...

Hackers Are Using Unpatched NAS Devices To Mine Bitcoin

In late 2020, QNAP discovered a pair of critical security vulnerabilities that would allow hackers to take remote control over network attached storage devices (NAS). In this particular instance, the hackers chose ...

Mobile App Vulnerabilities Found To Leave Data Unsecured

Most apps these days make use of cloud storage in order to minimize their footprint on your device. That’s good in theory, but based on new research from Zimperium, a disappointing percentage ...

Hacker Uses Zoom Invites To Steal Credentials Through Sendgrid

There’s a mix of bad news and good in the ongoing war against the hackers of the world. For the bad news, security professionals have recently detected a sophisticated phishing campaign that ...