News from the Web
Reducing the Time to Discovery: How to Determine if You Have Been Hacked
For most small businesses, the chances of falling prey to a long-term covert surveillance operation by well-resourced, likely state-backed actors are slim. To recap, that is what the evidence suggests happened in the SolarWinds compromise discovered last December. Many believe the company’s Orion update was used to conduct cyber espionage for months prior to being […]
The post Reducing the Time to Discovery: How to Determine if You Have Been Hacked appeared first on Webroot Blog.
Fools Rush in: 5 Things MSPs Should Know Before Adopting EDR
Buzzwords and acronyms abound in the MSP industry, an unfortunate byproduct of marketing years in the making. Cybersecurity is a hot watercooler topic at any business. Well, now probably more likely a virtual happy hour than a watercooler, but nevertheless cybersecurity remains top-of-mind. To sleep at night, MSPs feel they must enhance or expand their […]
The post Fools Rush in: 5 Things MSPs Should Know Before Adopting EDR appeared first on Webroot Blog.
AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware

Original release date: February 17, 2021SummaryThis Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework. See the ATT&CK for Enterprise for all referenced threat actor tactics and techniques.
This j…
The NSA Wants Businesses to Use DoH. Here’s What You Need to Know.
Most people would categorically agree that increased privacy online is a good thing. But in practice, questions of privacy online are a bit more complex. In recent months, you’ve likely heard about DNS over HTTPS, also known as DNS 2.0 and DoH, which is a method that uses the HTTPS protocol to encrypt DNS requests, […]
The post The NSA Wants Businesses to Use DoH. Here’s What You Need to Know. appeared first on Webroot Blog.
Hacker Personas Explained: Know Your Enemy and Protect Your Business
In today’s rapidly evolving cybersecurity landscape, the battle for privacy and security is relentless. Cybercriminals are masters at using technology and psychology to exploit basic human trust and compromise businesses of all sizes. What’s more, they often hide in plain sight, using both covert and overt tactics to cause disruption, steal money and data, and […]
The post Hacker Personas Explained: Know Your Enemy and Protect Your Business appeared first on Webroot Blog.
AA21-042A: Compromise of U.S. Water Treatment Facility
Original release date: February 11, 2021SummaryOn February 5, 2021, unidentified cyber actors obtained unauthorized access to the supervisory control and data acquisition (SCADA) system at a U.S. drinking water treatment plant. The unidentified actors …
How IT Will Prevail in the 2021 Cyber-Demic
While we can all rejoice that 2020 is over, cybersecurity experts agree we haven’t seen the last of the pandemic-related rise in cyberattacks. Throughout the last year, we’ve seen huge spikes in phishing, malicious domains, malware and more, and we don’t expect that to slow down. As employees around the world continue to work from […]
The post How IT Will Prevail in the 2021 Cyber-Demic appeared first on Webroot Blog.
Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs
The supply chain attack that Trojanized a SolarWinds update to infect and spy on the IT management platform’s customer base continues to be analyzed. Early reports have called the methods highly sophisticated and the actors highly trained. We do know that IP addresses, a command and control server and a malicious product update file were […]
The post Essential Threat Intelligence: Importance of Fundamentals in Identifying IOCs appeared first on Webroot Blog.
Four Roadblocks to Increasing Employee Security Through User Training
We’ve been doing our homework, and two things seem to be true about cybersecurity awareness training simultaneously: It can be very effective at protecting businesses from one of the most common security threats they face (the majority, according to the Ponemon Institute). Namely, phishing. MSPs, often the single most reliable source of cybersecurity for small […]
The post Four Roadblocks to Increasing Employee Security Through User Training appeared first on Webroot Blog.
Cyber News Rundown: Dairy Farm Ransomware
Dairy farm group faces $30 million ransom The Dairy Farm Group, one of the largest retailers in Asia, has suffered a ransomware attack by the REvil group, which has demanded a roughly $30 million ransom. The attack is still ongoing nearly nine days after being first identified. The attackers still have full control over the […]
The post Cyber News Rundown: Dairy Farm Ransomware appeared first on Webroot Blog.
News from onXtech
DOs and DON’Ts to Beat Identity Theft and Protect Your Financial Security

Your personal information is at risk every time you write it down or post it online. It’s critically important for your financial security that you take some simple steps to secure your information. The week of March 4-10 is National Consumer Protection Week. Opportunity Bank of Montana(Member FDIC) is taking this opportunity to remind customers that […]