by Ophtek, LLC | Jan 21, 2025 | AI, cybercrime, Employee Training, Ophtek, secure IoT, security practices, supply chain security, zero trust architecture
2025 promises to be an exciting year for businesses, but cybercrime will remain a major threat. That’s why strengthening your cybersecurity is essential. With the costs of cybercrime expected to hit $10.5 trillion in 2025, it’s evident that tackling cybercrime is a...
by Ophtek, LLC | Jan 14, 2025 | business router, default passwords, educate staff, Jupiter, Mirai botnet, monitor network, multi factor authentication, router
Strong passwords are vital to cybersecurity. A recent botnet attack highlights the serious risks of relying on default passwords instead of secure alternatives. The Mirai malware, first detected in 2016, has been behind numerous botnet attacks in the past and has been...
by Ophtek, LLC | Jan 7, 2025 | malicious downloads, Ophtek, phishing_email, PowerShell script, RAT, Remcos RAT, Remote Access Trojan
Malware has a habit of going through periods of intense activity, and this is exactly what the Remcos RAT malware has been up to in Q3 2024. First detected in 2016, Remcos is somewhat of a veteran of the malware scene, but its activity has ramped up significantly...
by Ophtek, LLC | Dec 31, 2024 | Black Basta, DarkGate, junk emails, Microsoft Teams, Ophtek, TeamViewer, Zbot
Microsoft Teams has become an integral part of business life, but it also represents a sure-fire malware opportunity for threat actors. Teams can be used for videoconferencing, voice calls, file sharing, and numerous collaborative processes, so it’s no surprise that...
by Ophtek, LLC | Dec 24, 2024 | BYOVD, cryptojacking, data theft, DDoS attacks, driver whitelisting, drivers, educate staff, Hacking, Ophtek, Updates
One of the recent developments in hacking has been the Bring Your Own Vulnerable Driver (BYOVD) attack, but what is it and how do you defend against one? By now, the Ophtek blog should have informed you about ransomware, trojans, and cryptojacking, but we’ve rarely...