Jaspen IT Services
  • Home
  • Our Services
    • Computer Repair
    • Digital Signage
    • Managed Antivirus/Malware
    • Remot Support
    • Security Cameras
    • VOIP Phone Solutions
    • Web Design
    • WiFi Services
  • News
  • Online Payment
  • Login
  • Support
  • Contact
  • tel: 760-872.2797
Select Page

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

May 2, 2021 | Government, Hacks, InfoSec Insider, Malware, News

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange Oliver Tavakoli, CTO of Vectra AI, discusses the differences between the massive supply-chain hack and the Exchange zero-day attacks, and their legacy and ramifications for security professionals. Go to Source...

WeSteal: A Cryptocurrency-Stealing Tool That Does Just That

May 2, 2021 | Hacks, Malware, News

WeSteal: A Cryptocurrency-Stealing Tool That Does Just That The developer of the WeSteal cryptocurrency stealer can’t be bothered with fancy talk: they say flat-out that it’s “the leading way to make money in 2021”. Go to Source Author: Lisa...

REvil’s Big Apple Ransomware Gambit Looks to Pay Off

Apr 24, 2021 | Government, Hacks, Malware, News

The notorious cybercrime gang could make out whether or not Apple pays the $50 million ransom by May 1 as demanded.

Spotlight on Cybercriminal Supply Chains

Apr 24, 2021 | Hacks, News, Newsmaker Interviews, Podcasts

In this Threatpost podcast Fortinet’s top researcher outlines what a cybercriminal supply chain is and how much the illicit market is worth.

4 Innovative Ways Cyberattackers Hunt for Security Bugs

Apr 22, 2021 | Hacks, InfoSec Insider, News, Vulnerabilities, Web Security

David “moose” Wolpoff, co-founder and CTO at Randori, talks lesser-known hacking paths, including unresolved “fixme” flags in developer support groups.

Pulse Secure Critical Zero-Day Security Bug Under Active Exploit

Apr 22, 2021 | Government, Hacks, Malware, News, Vulnerabilities, Web Security

CVE-2021-22893 allows remote code-execution (RCE) and is being used in the wild by nation-state cyberattackers to compromise VPN appliances in defense, finance and government orgs.
« Older Entries

Recent Posts

  • Why Apple’s overall Privacy focus in iOS 16.3 and macOS 13.2 is a big deal
  • Galaxy Book 3 leak spills the beans on the latest Samsung laptops
  • Yandex denies it was hacked, says rogue employee to blame for breach
  • How your office printer can offer a secret sustainability improvement
  • Lexmark security bug leaves thousands of its printers open to attack

Recent Comments

    The Jaspen Corporation © 1999 - 2022
    Web Design | Hosting |IT Solutions | Film Production Services | Webmail Access | Privacy Policy | Accessiblity Statement