Blog - TSP

North Korean hackers distributing malware through deceptive coding tests

Researchers have uncovered malicious software packages linked to the Lazarus Group, a North Korean hacking group. These malicious actors are posing as recruiters, using financial firm names to attract developers. Understanding Lazarus Group’s tactics  Callie Guenther, Senior Manager of Cyber Threat Research at Critical Start, explains, “The Lazarus Group’s scheme of using fake coding assessments […]

Education quality impacted by ransomware for 64% of IT workers in education sector

A recent survey conducted by Action1 highlights the potential impact of cyberattacks on the education sector. The survey, which involved 250 IT professionals from educational institutions in the United States and the United Kingdom, brings to light key concerns and assessments regarding school cybersecurity. The findings reveal that 64% of respondents are worried about ransomware […]

Planned Parenthood of Montana Falls Victim to Cyber Attack

Planned Parenthood of Montana was targeted in a cyber attack that exposed 93 gigabytes of data. Allegedly, RansomHub is claiming responsibility for the breach and threatening to leak the data if a ransom is not paid.  Planned Parenthood of Montana discovered the breach on August 28, 2024. Their IT team is currently investigating the extent […]

Free webmail domains accounted for 72% of BEC attacks

Phishing threats were analyzed in a recent report by APWG.  According to the report, fraudsters are increasingly calling potential victims directly, and luring them with text messages that may contain a phone number for the targeted subscriber to call. These phone-based methods are more immediate, and allow fraudsters to talk victims out of their sensitive […]

Progress Software releases patch for critical vulnerability

Progress Software has released an emergency fix to address a vulnerability affecting its LoadMaster and LoadMaster Multi-Tenant (MT) Hypervisor products. This vulnerability, known as CVE-2024-7591, is classified as a critical security issue. The vulnerability involves improper input validation, which could potentially allow unauthenticated, remote attackers to access the LoadMaster management interface. Insights from Security Experts […]

Just 5% of Business Leaders Experience Seamless Connectivity

A survey of 500 enterprise leaders across six countries (United States, United Kingdom, Germany, Japan, Canada and Australia) highlights the relationship between connectivity and cybersecurity. The research asserts that better connectivity improves an organization’s chances of defending against cyberattacks, as 38% of organizations with excellent connectivity are among industry leaders for cybersecurity performance. When an […]

Lowe’s workers subjected to malicious advertising scheme

Reports have uncovered a malvertising campaign directed at Lowe’s employees. This campaign, utilizing Google ads, aims to gain access to current and former employee credentials. The deceptive Google ads show up when searching for Lowe’s internal HR portal, MyLowesLife. The URLs of these ads closely resemble the legitimate HR portal website, potentially tricking users into […]

Avis Rent A Car reveals data breach

On early September, 2024, Avis Rent A Car System disclosed a data breach. During the period of August 3 to 6, 2024, an unauthorized third party managed to access one of Avis’s business applications and obtained customer information. Customers were recently notified by Avis that the breach may have led to the theft of the […]

Subscribe Our Newsletter

We hate spam, we obviously will not spam you!

Services
Use Cases
Opportunities
Resources
Support
Get in Touch
Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC

Copyright © TSP 2024. All rights reserved. Designed by Enovate LLC