by Ophtek, LLC | Aug 8, 2023 | Artificial Intelligence, cryptojacking, cybersecurity, malware, Ophtek, Phishing, Ransomware, remote workers
We’re already halfway through 2023 and threat actors are showing no signs of slowing up, but just where is cybersecurity heading? It may feel as though you’re waging a never-ending battle against hackers and, well, that’s exactly what you’re doing. However, the...
by Ophtek, LLC | Aug 1, 2023 | malware, Ophtek, Phishing, social engineering, Vidar Malware, Viruses
E-commerce means big business in the 21st century and it proves a highly attractive target to threat actors, as online sellers are now finding out. Such is the size of the e-commerce industry – estimated to hit $4.11 trillion in 2023 – threat actors have many...
by Ophtek, LLC | Jul 25, 2023 | cybersecurity, DLL_hijacking, email_links, email_sender, Ophtek, Phishing, Updates, WordPad
WordPad, a basic yet popular word processor, is the latest Windows app to fall victim to a vulnerability exploited by threat actors. Bundled free with almost every version of Windows since Windows 95, WordPad has remained popular thanks to its simplicity....
by Ophtek, LLC | Jul 4, 2023 | ChatGPT, cyber attacks, malware, Ophtek, Phishing, two-factor authentication
The launch of ChatGPT and its accompanying headlines have been heard around the world. And threat actors are leveraging this interest to launch new attacks. You don’t have to look hard to find a headline relating to ChatGPT, the latest and most intriguing AI...
by Ophtek, LLC | May 2, 2023 | AsyncRAT, Formbook, OneNote, Ophtek, Phishing, Qbot
Making notes is part and parcel of any working day, so it’s fantastic that we have apps such as Microsoft’s OneNote. Except when it opens you up to malware. Part of the Microsoft Office suite, OneNote is an app which allows you to create notes and store them in one...
by Ophtek, LLC | Mar 14, 2023 | cookies, Google Authenticator, Ophtek, Phishing, Two Factor Authentication
Two-factor authentication (2FA) is there to provide a high level of security, but what happens when this process is compromised? CircleCI is a platform used by software developers to build, test and implement code. Therefore, due to the amount of confidential and...