The Heroic Blog
IT and Cybersecurity Tips
Massive Phishing Attack Scammed Millions of Facebook Messenger Users
According to research conducted by the cybersecurity firm PIXM, there is a massive phishing campaign that peaked in April and May of this year (2022) and it is still ongoing. The campaign has lured millions of unsuspecting users to phishing pages by abusing Facebook and Facebook Messenger and tricking users...
Beware New Windows Vulnerability With Remote Search Window Access
You may not know the name Matthew Hickey, but you should thank him for a recent discovery that could save you a lot of grief. Hickey is the co-founder of a company called Hacker House. He recently discovered a flaw that could allow for the opening of a remote search...
Microsoft Will Not Release Exchange Server Updates Until 2025
Are you planning on setting up an Exchange server soon or are you running one now? If so, be aware that Microsoft is changing their guidance when it comes to the technology and specifically running a server on-premises. Two years ago, the Redmond giant announced that the next versions of...
New Phishing Attacks Use HTML Email Attachments
HTML attachments as an attack vector may seem a little old school. However, according to statistics compiled by Kaspersky Lab indicates that in 2022, that form of attack is not just simply still being employed, but hackers are making surprisingly regular use of it. The security company detected more than...
Update VMWare Apps Now for Critical Security Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an advisory that serves as a stark warning. If you’re using VMware products that are impacted by recently disclosed critical security flaws, either patch them immediately or remove them from your network. CISA issued the dire warning because the last time...
Tricky Ransomware Encrypts Small Data But Overwrites Large Data
The MalwareHunterTeam recently discovered a new ransomware operation that is particularly nasty. Called Onyx, outwardly, the operation does what most ransomware campaigns do. It gets inside a corporate network, exfiltrates the data that it wants, then seems to encrypt the rest, and then threatens to release the files to the...
Three Big Companies Working on Passwordless Login Options
Ask just about any IT security professional and they will tell you that weak user passwords are one of the biggest problems and most persistent threats to corporate networks. Users Continue Making the Same Mistakes Despite years of training, re-training, and near-constant reminders to strengthen passwords, users keep making the...
Google Soon Informing Users About What Data Apps Collect
A small but important change is coming to your Android apps. Soon you’ll notice a new Data Safety section on the Google Play Store which will provide greater transparency about exactly what data the apps you install are collecting. The change is meant to serve as a “privacy label” that...
Update Now If You Run This WordPress Plugin
Millions of people around the world have leveraged the awesome power of WordPress to build their sites. Whether for personal or business use, WordPress has the flexibility and functionality to create just about any type of site you can dream of. A large part of this flexibility comes from the...
Large Company Snap-On Tools Recently Hit By Data Breach
If you have any tools in your garage, odds are good that at least a few of them are Snap-on tools. The brand is ubiquitous in the United States and the company is one of the leading manufacturers globally. They sell under a variety of different brand names and some...
Download the
Business Owner’s Guide to Cybersecurity
Browse Topics
Protect & Streamline Your Firm
Contact us today to discover how our team of IT heroes can help secure, streamline, and optimize your business so you can focus on growth while we handle your tech.