Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Vulnerabilities Found Inside Azure-Linked Managed Database Service

Vulnerabilities Found Inside Azure-Linked Managed Database Service

It’s not unheard of for some threats to remain undiscovered for months or even years, as is the case with a particularly nasty one in the Microsoft Azure database system. This exploit, discovered by cloud security provider Wiz, is built into Cosmos DB, Microsoft Azure’s managed database service. Let’s take a look at the exploit and see what we can learn from it.

0 Comments
Continue reading

Cybersecurity Tools Now Delivering Ransomware

Cybersecurity Tools Now Delivering Ransomware

Another ransomware threat is out and about, this time targeting unpatched and end-of-life products in SonicWall’s Secure Mobile Access (SMA) 100 series and Secure Remote Access (SRA) products. To make things worse, the threat is currently being used, so businesses utilizing these devices must take action now to limit how much damage this ransomware can do.

0 Comments
Continue reading

Don’t Make Security Harder for Your Business

Don’t Make Security Harder for Your Business

Security can be tough for small businesses to optimize, but that does not make it any less important. One such way that security can work against you is actually your employees’ predispositions toward it; the cognitive biases that your employees have regarding security can put your company at risk, even if that is the last thing on their minds.

0 Comments
Continue reading

Training is Crucial to Establishing a Security Strategy

Training is Crucial to Establishing a Security Strategy

Cybersecurity is one of those components to an IT strategy that is absolutely critical; you cannot ignore it in today’s age of ransomware and other high-profile hacks. In order to make sure that you are prepared to handle anything that comes your way, you must periodically test your security practices and assess how well your team can prepare for attacks. The question remains as to how often you should do this.

0 Comments
Continue reading

What You Need to Do If Your Business is Hacked

What You Need to Do If Your Business is Hacked

Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organization. This is precisely why it is so important that—should a business be hacked—the proper steps are taken in response.

0 Comments
Continue reading

The Current State of Cybercrime Paints a Grim Picture for Businesses

The Current State of Cybercrime Paints a Grim Picture for Businesses

Over the past year, entrepreneurs have focused on how to do business during the global COVID-19 pandemic. The public health crisis has been an opportunity for fraudsters and hackers, and the result has been an increase in losses (compared to the second-worst period on record) by over 50 percent. Let’s consider the situation, and how it is—unfortunately—getting worse.

0 Comments
Continue reading

How Cybercriminals Are Keeping Themselves Entertained

How Cybercriminals Are Keeping Themselves Entertained

With the given pandemic, a lot of people have had a bit more time on their hands, so it makes sense that many are turning to streaming services and the like for their entertainment. Unfortunately, this has not gone unnoticed by cybercriminals.

Let’s take a few moments and examine the practice of credential stuffing.

0 Comments
Continue reading

What Are the Biggest Cybersecurity Concerns Going into 2020?

What Are the Biggest Cybersecurity Concerns Going into 2020?

Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.

0 Comments
Continue reading

Watch Out For Large Amounts of Scams This Holiday Season

holiday-resize_20191227-162950_1

The 2019 Holiday Season is officially upon us, and unfortunately, that means that scammers around the world are ramping up for another busy season. Deals are abound on Black Friday and Cyber Monday. Sadly, those two big shopping days mark the beginning of a mad sprint to push out as many shopping-related scams as possible. Researchers at ZeroFOX have been monitoring the online retail landscape and have identified more than 60,000 potential scams, most of them aimed at mundane product categories that are not categorized as luxury items.

0 Comments
Continue reading

Automation Plays a Critical Role in Cybersecurity

Automation Plays a Critical Role in Cybersecurity

Automation is sometimes misconceived as a troublesome or unreliable addition to business. It’s not about replacing people with machines, it’s about getting more done with the people you have. Having an attitude that doubts technology and believes nothing can replace human processing can quickly put you at a disadvantage compared to your competitors.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

Zombieload V2 Is Back To Wreak Havoc On Intel Chips

zombie-12-2

Zombieload is back. First discovered in May of this year, it was described as a successor to the infamous Meltdown attack. That was a data-leaking side-channel vulnerability that impacted all Intel processor generations from 2011 and beyond. Intel hasn't had a good run of late, being beset almost constantly by these kinds of issues, and Zombieload was one of three new MDS variants discovered.

0 Comments
Continue reading

New Ransomware Targets Removable And Attached Drives

drive-11-29

There's a new and unusual ransomware strain making the rounds that you should be aware of. Called 'AnteFrigus,' it is primarily distributed via 'malvertising' that redirects users to the RIG exploit kit. One of the most unusual features of this strain is the fact that it specifically doesn't target the C: drive of the target computer.

0 Comments
Continue reading

Microsoft Cortana App Getting Dropped From Many Countries

microsoft-11-28

It appears that Microsoft is getting rid of their Cortana App in several countries due to security concerns. The question is whether the United States will be next. Recently, the following notice appeared on Microsoft's UK site:"To make your personal digital assistant as helpful as possible, we're integrating Cortana into your Microsoft 365 productivity apps. As part of this evolution, on January 31, 2020, we're ending support for the Cortana app on Android and iOS in your market. At that point, the Cortana content you created - such as reminders and lists - will no longer function in the Cortana mobile app or Microsoft Launcher, but can still be accessed through Cortana on Windows. Also, Cortana reminders, lists, and tasks are automatically synced to the Microsoft To Do app, which you can download to your phone for free.After January 31st, 2020, the Cortana mobile app on your phone will no longer be supported and there will be an updated version of Microsoft Launcher with Cortana removed."

0 Comments
Continue reading

Hackers Are Imitating Government Agencies To Spread Malware

government-11-22

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with a variety of malware.

0 Comments
Continue reading

Another WhatsApp Vulnerability Has Been Found

whatsapp-11-21

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner of the globe. The company is still reeling from the blowback associated with these various issues, but their troubles don't seem to be over yet.

0 Comments
Continue reading

Google Chrome Users Should Update Immediately

update-11-14

If you're using Google's Chrome browser to read this article, be advised that the company has announced the presence of a pair of major, Zero-Day vulnerabilities that put you at immediate risk. Not only are the flaws of the highest possible severity, but hackers have already begun exploiting them.

0 Comments
Continue reading

Employees Targeted By Hackers Posing As HR Department

HR-11-12

Just when you think scammers couldn't get any lower, they find new ways to prove you wrong. Recently, a new phishing scam has been spotted in the wild, this one baiting potential victims with the possibility of pay raises. The scammers structured their email so that they appeared to come from the Human Resources department of their victims' companies. They asked the recipient of their phishing email to open an Excel spreadsheet bearing the name "salary-increase-sheet-November-2019.xls."

0 Comments
Continue reading

New Server Data Breach Reported at NordVPN

breach-11-5

NordVPN provides a popular Virtual Private Network (VPN) service used by clients around the world. Unfortunately, they recently disclosed that a server in one of their data centers was breached back in March of 2018. According to the details released, the server was located in a data center in Finland. It was compromised due to an insecure remote management system that was left in place by the data center provider. Worse, this was a system that NordVPN never even knew existed.

0 Comments
Continue reading

Backdoor Could Be Used On Microsoft SQL Without Detection

back-door-11-4

If you haven't heard of Skip-2.0 yet, prepare to be dismayed. Security researchers have recently discovered an undocumented (until now) backdoor designed for Microsoft SQL servers. It will allow a hacker working remotely to stealthily take control of a previously compromised system. Worse, this is not theory or conjecture. Researchers have found malware strains in the wild that take advantage of the backdoor, allowing attackers to remotely connect to any account on the server running MSSQL version 11 or 12 by using a "magic password."

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106