Skip to content
  • Fri. Apr 3rd, 2026

Oversitesentry Cyber

Defend Your Systems

  • Store
    • Cart
    • Checkout
    • My account
  • About
    • Contact Us
  • Cybersecurity Overview
    • Small Business PCI Compliance
    • Secure computing solution
    • All It Takes Is One Weak Computer
  • Top30 Security Links to Review
Top Tags
  • CurrentNews
  • HistoryInfo

Latest Post

Make Unlimited Amount of Money$$$ Using AI!! AI Being Used in Your Company? Good and Bad!!! Need to reduce gmail storage? AI Has to Be Used Correctly Security Policy – What is it good for?
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt
computersecuritynews

AI Has to Be Used Correctly

February 9, 2026 zafirt
computersecuritynews securitycompliance

Security Policy – What is it good for?

January 28, 2026 zafirt
  • Latest
  • Popular
  • Trending
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
Need to reduce gmail storage?
computersecuritynews ITSecurity Training
Need to reduce gmail storage?
AI Has to Be Used Correctly
computersecuritynews
AI Has to Be Used Correctly
ITSecurity Training securitycompliance
Why Risk Management Model Failed Us
ITSecurity Training
DARKNET- Know it – Learn it
computersecuritynews
Risk management Failed Us!
computersecuritynews Securityexploits
Zero-Day Attacks And Why Patching Means Catching Up
Make Unlimited Amount of Money$$$ Using AI!!
Artificial Intelligence computersecuritynews cyberjokesFriday
Make Unlimited Amount of Money$$$ Using AI!!
AI Being Used in Your Company? Good and Bad!!!
China computersecuritynews Securityexploits
AI Being Used in Your Company? Good and Bad!!!
Need to reduce gmail storage?
computersecuritynews ITSecurity Training
Need to reduce gmail storage?
AI Has to Be Used Correctly
computersecuritynews
AI Has to Be Used Correctly
Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt

How do we do that? With AI of course So seriously how can we achieve that? BY using the recursive ability of computer tech in AI. What is recursive? A…

China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt

Good it will hopefully make your employees more efficient. Bad now that people are entering data and questions into AI cloud companies what is going to happen with this information?…

computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt

Here are some tips to reduce gmail storage in case you have a lot of email that is causing you to pay for the extra storage (because more than a…

computersecuritynews

AI Has to Be Used Correctly

February 9, 2026 zafirt

AI Artificial Intelligence has to be used with some intelligence which of course depends on what you want out of it. Are you building computer code? Then it is best…

computersecuritynews securitycompliance

Security Policy – What is it good for?

January 28, 2026 zafirt

Well it is not what the Rush Hour Duo sing in: What is it good for? Absolutely Nothing!! Technically they are entertaining and doing their thing, so it is not…

Artificial Intelligence computersecuritynews

Google Gemini is a Hacker’s Dream

January 21, 2026 zafirt

Hackernews article Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites The money quote: “The vulnerability, Miggo Security’s Head of Research, Liad Eliyahu, said, made it possible…

Artificial Intelligence securitycompliance SecurityThreats

New Year Same Problems – Hackers Try to Get Clicks

January 7, 2026 zafirt

Yes this time it is a successful attack on the hospitality industry in Europe – so why include? Because if it is working there – it will come here, just…

Artificial Intelligence computersecuritynews securitycompliance

If We Do Use AI How Should Small Business do that?

December 11, 2025 zafirt

Why should a small business (or any business) need AI to run xyz function? Let’s say you want to create proposals and have older proposals and current products and other…

computersecuritynews

Create Guardrails for Company AI usage

December 5, 2025 zafirt

Everyone wants to use AI – but what about the negative effects? Like losing data to the public – or “leaking data”? So how can AI be boxed in? Hallucinate…

Artificial Intelligence computersecuritynews securitycompliance SecurityThreats

AI browsers Security Called Into Question – Make it secure after breach?

November 28, 2025 zafirt

Futurism.com has a story on how Perplexity AI browser is not very good with security concerns: The vulnerability, known as an indirect prompt injection attack, is terrifyingly simple. “The vulnerability…

securitycompliance Securityexploits SecurityThreats

19 year old Microsoft code needs to be Deleted All Windows Systems

November 13, 2025 zafirt

CVE-2025-24990. Microsoft’s legacy code nightmare. A driver for old fax modems (ltmdm64.sys) has been quietly sitting on every Windows system since 2006. Possibly even Windows XP, Windows 7, 10, 11,…

computersecuritynews

Q-Day the Encryption Breaking Armagaddon

October 28, 2025 zafirt

Posed a question to Grok about the Q-day timeline – and it came back with this: The question is designed for small business and using the DEFCON presentation mentioned below.…

computersecuritynews

The Classic Question – How much to spend on Cybersecurity?

October 17, 2025 zafirt

Let’s discuss this question (How much to spend?) on cybersecurity… with a conversation of Jimmy and Jane who are small business owners and have certain viewpoints: Jimmy (Sales-Focused Owner): Hey…

computersecuritynews

Heard of Syncjacking? Your Home Browser infects your work Browser!!

October 6, 2025 zafirt

Here is the info from Grok copied verbatim: (from a specific question regarding syncjacking) ————————————————————————————————— Browser sync features, such as those in Google Chrome, allow users to synchronize data like…

computersecuritynews ITSecurity Training SecurityThreats

What Makes Phishing so effective?

September 16, 2025 zafirt

There are some Docusign phishing attempts as catalogued here at Malwarebytes.com How can one really tell that it is not a legitimate Docusign instead of a fake site or fake…

computersecuritynews Securitybreaches securitycompliance

What if We are Losing Cybersecurity War?

September 4, 2025 zafirt

What is Cybersecurity? Is it the way one uses and defends their data and systems? CISA the government agency (not my certifications Certified Information Systems Auditor by ISACA) … I…

computersecuritynews

After Ransomware How to Rebound to Normal

August 20, 2025 zafirt

If you got ransomware – now what? How can you recover and get back to normal? Here are some images of ransomware from older posts on this blog: Asking your…

Securitybreaches securitycompliance Securityexploits

Clickjacking to Farm Facebook “Likes” Porn Pics are Bad

August 14, 2025 zafirt

What is Clickjacking? “Porn sites are stuffing SVGs with clickjacking code to farm Facebook likes” refers to a specific type of cyberattack involving both SVG files and clickjacking techniques. Above…

Securityexploits SecurityThreats

DPRK Actively Trying to Make Money on Our Businesses

August 8, 2025 zafirt

As these FBI Images show and the text “2 DPRK Agents actively bilked almost a Million$”: Jin Sung-Il and Pak Jin-Song are wanted for their alleged involvement in a fraudulent…

Artificial Intelligence computersecuritynews securitycompliance

AI Implemented without Governance Concerns

July 31, 2025 zafirt

As this story pointed out at the Register: “Enterprises neglect AI security – and attackers have noticed” The findings come from Big Blue’s Cost of a Data Breach Report 2025…

Artificial Intelligence computersecuritynews Securitybreaches

AI Search and Summary Caused Hack

July 29, 2025 zafirt

From the post at 0din.ai: Phishing With Gemini A new type of attack without links included in the email. Let’s say you received an email – has only text and…

Artificial Intelligence computersecuritynews Securitybreaches

Google Claims AI Agent Found Zero Day Vulnerability

July 16, 2025 zafirt

Out of a Record.media story where Google “Big Sleep” AI tool found a vulnerability that was not yet uncovered. The white paper referenced by Google discusses how to use AI…

Artificial Intelligence securitycompliance SecurityThreats

AI Errors Or Hallucinations if you like

July 14, 2025 zafirt

Livescience article below claims Hallucinations are a feature not a bug. AI LLM models and others, but let’s back up and set some descriptions: From this site Tolokai.ai Difference between…

ITSecurity Training securitycommunity securitycompliance

Teaching Social Engineering. Thing to Keep in Mind

July 9, 2025 zafirt

you.com AI responded with the following list of how people learn: Spatial Thinkers – Visualize relationships and mentally “map” information Experiential Learners – Learn by doing (trial, error, iteration) Sequential…

ITSecurity Training securitycompliance Securityexploits

More Browser Problems!

July 2, 2025 zafirt

First couple of paragraphs in Dark Reading story says it all: Both the Google Chrome and Mozilla Firefox browsers currently are under separate attacks, the former from actors exploiting a…

oversitesentryapproved Securitybreaches SecurityThreats

Do you have a Wifi alarm clock?

June 25, 2025 zafirt

iank.org says they have serious flaws specifically the Loftie alarm clock This is apparently in the alarm clock file structure: $ strings config.arm64_v8a.apk ... assets/icons/clock.svg _setClient@91206165 _TapStatusTrackerMixin@113288344 https://fwbek2lb0a213kbewqoit.byloftie.com/Loftie_EVT.bin # <-------…

ITSecurity Training securitycommunity securitycompliance

What can be done when confronted with ClickFix?

June 17, 2025 zafirt

What happens when you are confronted with ClickFix? i.e. (from a linkedinpost by Alex Zammit ) A site popped this “I’m not a Robot check”. The site injected a command…

Securitybreaches securitycommunity SecurityThreats

Botnet Takes Advantage of Cheap IoT Devices

June 10, 2025 zafirt

Yes I am assuming IoT devices from china are ‘cheap’. Look at this FBI IC3 headline: Home Internet Connected Devices Facilitate Criminal Activity probably important to know – what is…

computersecuritynews Securityexploits SecurityThreats

Make Assessments and Prepare for the Unknown

June 2, 2025 zafirt

In Cybersecurity we are programmed to prepare for the constant Internet attacks. But there are many aspects to these attacks, including what is considered a watering hole tactic. A watering…

computersecuritynews securitycommunity

Thanks for Service and Stop Downloading Malware

May 26, 2025 zafirt

A dual message this memorial day 2025 Thanks for the service of all who fell for our country!!! Also do not download malware and thus do the work of the…

computersecuritynews Securityexploits SecurityThreats

Google Scam Attack Confirms Cybersecurity Issues

May 23, 2025 zafirt

The issue of What can be used for us will be used against us. I.e. We want to use the internet – it will be used to attack us. So…

computersecuritynews ITSecurity Training securitycompliance SecurityThreats

Social Engineer Attack examples: Texts and email

May 19, 2025 zafirt

Here are some standard emails that came into my mailbox that are obviously fake…. Also an older post(7/15/2024) discussed a tax refund scam… by text and email Here is text…

computersecuritynews Securitybreaches Securityexploits

Learning From Lewis & Clark College Portland Oregon Misfortune

May 15, 2025 zafirt

JDSupra among other ezines on the Internet have cataloged the Lewis & Clark College in Portland hack Basically in March 2023 the administrators or others at the college learned that…

ITSecurity Training securitycompliance

Social Engineering Attack Affect Can Be Reduced

May 12, 2025 zafirt

How? With training and security policies. Create a security culture and train your employees with a Security Policy. Train the employees to ensure they understand the security policy Here is…

ITSecurity Training Securityexploits

Ready for Quishing Attacks?

April 24, 2025 zafirt

Quishing – the QR code that sends you to download bad stuff Let’s go back to what is a QR code from digital.gov? QR codes (or Quick Response codes) are…

computersecuritynews Securitybreaches

How Did CCP Unit 61398 Hack Us?

April 14, 2025 zafirt

why discuss now? This is the FBI 5 Unit61398 From left, Chinese military officers Gu Chunhui, Huang Zhenyu, Sun Kailiang, Wang Dong, and Wen Xinyu indicted on cyber espionage charges.…

ITSecurity Training securitycompliance

Top 3 items to focus on in Cybersecurity? Healthcare

April 9, 2025 zafirt

What would be the Top 3 items to consistently work on so that cybersecurity does not have to be worried about. (Main image above is the Cottage Health systems picture…

computersecuritynews ITSecurity Training

Security Policy Can improve Cybersecurity

April 1, 2025 zafirt

With a Security Policy one can improve Cybersecurity and thus be proactive in keeping attacks to a risk managed level. We interrupt your boring cybersecurity NEWS ……Breaking news… The Moonwalk…

ITSecurity Training securitycompliance

Improve Cybersecurity – Level Up – Better than Losing Data and Money

March 24, 2025 zafirt

Yes it is better to learn a little more Cybersecurity or to “level up your knowledge” rather than the alternative. We have a typical business owner -1st: Has to figure…

computersecuritynews

Small Business Cyber Target? Maybe a Rabbit Foot Helps…

March 14, 2025 zafirt

It is Friday and we are trying to find jokes in cybersecurity? or are we? We are selling these rabbit feet so that you will not get hacked* "Why don’t…

Securitybreaches Securityexploits SecurityThreats

Another Router being exploited now: Archer TP-Link

March 13, 2025 zafirt

Hackernews has another story about exploited devices: Archer routers This router the Archer TP link “The botnet exploits a remote code execution (RCE) vulnerability in TP-Link Archer routers (CVE-2023-1389) to…

securitycommunity securitycompliance

Kostas Talks Cybersecurity

March 4, 2025 zafirt

Let’s discuss Psychology of Security and use humor instead of more cyber headlines to explain some aspects such as spending time and money before an event happens or other cybersecurity…

computersecuritynews ITSecurity Training securitycommunity

Hackers Attack with Phishing to Small Business

February 20, 2025 zafirt

Searching in Grok for small business data on phishing stats “What is phishing attack statistics for small businesses” Grok searched 15 websites and came up with this: Phishing attacks are…

computersecuritynews Securityexploits SecurityThreats

15k Fortinet Configurations Leaked-Microsoft 365 Accounts Targeted with Phishing Kit

January 21, 2025 zafirt

2 interesting issues have been uncovered by cybersecurity researchers. Hackernews article: “New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass” Phishing campaigns have been observed sending…

computersecuritynews securitycompliance SecurityThreats

WordPress, Magento, and Opencart new vulnerability

January 14, 2025 zafirt

Hackernews has the story “New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites” from last year, and this morning it is https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html. There are distinct similarities (WordPress Ecommerce and…

computersecuritynews Securitybreaches securitycompliance

HIPAA Rules Upgrade What it Means?

January 9, 2025 zafirt

There is a new “rulemaking” that is trying to get the process started for updated HIPAA regulations. At the federalregister.gov First we have to review as to how we got…

ITSecurity Training securitycommunity securitycompliance

10 cybersecurity Items for 2025

December 30, 2024 zafirt

Cybersecurity Focus Areas for Small Businesses in 2025 As we approach the new year, small businesses should prioritize their cybersecurity strategies to protect against evolving threats. Here are 10 essential…

computersecuritynews SecurityThreats

2 Stories About Zero-day Vulnerabilities Exemplify Need of Update Program

November 27, 2024 zafirt

These 2 Vulnerabilities on Zero-day vulnerabilities have possibility of causing much mayhem unless you have cybersecurity program in place to deal with updates or patches as quick as possible and…

Artificial Intelligence China computersecuritynews SecurityThreats

Can Nvidia Technology Accelerate Computing 4x Every Year?

November 19, 2024 zafirt

And what does it mean to Cybersecurity? As in the latest videos by Jason Huang the CEO of Nvidia where the Blackwell architecture and other pieces have been revealed with…

computersecuritynews ITSecurity Training

Why Humanity Denies Cybersecurity Needs!!

November 12, 2024 zafirt

We are obviously in trouble because there are large numbers of people with inadequate Cybersecurity habits. How many computers get hacked every year? I asked Claude AI: “How many computers…

Artificial Intelligence Securityexploits SecurityThreats

Are We Still Waiting for Criminals to use AI to Attack?

October 25, 2024 zafirt

I think you know the answer to that: United Nations Office on Drugs and Crime has found multiple areas in the world where there is a confluence of criminal gangs…

computersecuritynews

IT Governance May not be Sexy or Exciting, but Makes IT Easier Overall

October 1, 2024 zafirt

How IT Governance Enhances Cybersecurity IT governance plays a crucial role in strengthening cybersecurity within organizations by ensuring that cybersecurity strategies are aligned with overall business objectives and risk appetites.…

computersecuritynews Securityexploits SecurityThreats

3 Ongoing cybersecurity Issues “Interesting”

September 18, 2024 zafirt

Ivanti Legacy Cloud appliance has a bad vulnerability (remove/ upgrade ASAP) Scammers are posing as Apple care services in github and Google ads (Malware Bytes article)which are fake. Some windows…

Artificial Intelligence securitycommunity securitycompliance

What is AI ethics?

September 6, 2024 zafirt

How do we make decisions? When we hire, or when we decide what website to read for more information. Is it important to know how we made these decisions or…

Artificial Intelligence computersecuritynews ITSecurity Training

After Ransomware Hit Should You Pay Up?

August 23, 2024 zafirt

I found this article at Technewsworld : Experts Weigh In on Refusing or Paying After a Ransomware Attack So Ransomware happened… (let’s not worry how or why for now). Now…

Artificial Intelligence ITSecurity Training securitycompliance

Key Areas to Audit in Cybersecurity?

August 16, 2024 zafirt

I am in cybersecurity field and every now and then I wonder aloud: “Are we doing enough to protect our computers and networks?” Since i have been using AI tools…

Artificial Intelligence ITSecurity Training SecurityThreats

Can AI be Used by Attackers?

August 1, 2024 zafirt

Does the sun shine brightly? Yes. Remember the old adage, everything we use can be used against us… so of course attackers will use AI. So yes AI or artificial…

computersecuritynews

Governance and Update Policies

July 26, 2024 zafirt

When an update is necessary (as it is every month) “Patch Tuesday” means Microsoft combines multiple necessary vulnerability updates into one convenient date (2nd Tuesday). For example July it was…

ITSecurity Training securitycommunity securitycompliance

Better password policy: Complex? or longer passwords?

July 19, 2024 zafirt

What is the better password policy? A longer password like NIST 800-53 says? Key NIST password guidelines Minimum length of 8 characters and maximum length of at least 64 characters…

computersecuritynews securitycommunity

Fake Email? or Phishing Email?

July 15, 2024 zafirt

I got this email from Cathy Clarke… It claimed to be able to help me get a tax refund due to the SETC and ERC federal programs because of the…

computersecuritynews ITSecurity Training securitycompliance

Patch Tuesday: Zero-day Vulnerability Fixes

July 10, 2024 zafirt

Yes it was Patch Tuesday July9th (yesterday). This means Krebsonsecurity had a post describing all the action: The first Microsoft zero-day this month is CVE-2024-38080, a bug in the Windows…

computersecuritynews ITSecurity Training

Happy 4th of July!! do your Backups!!

July 4, 2024 zafirt

Happy 4th of July: I always do a full backup on this day – so I have at least a few backups at July 4th and Christmas. I may backup…

computersecuritynews Securityexploits SecurityThreats

Openssh RCE vulnerability – Patch Now!

July 2, 2024 zafirt

As Hackernews has in its posts: New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems RCE = Remote Code Execution , i.e. the hacker does not need…

Artificial Intelligence computersecuritynews securitycommunity securitycompliance

Risk Management AI Framework by NIST

June 27, 2024 zafirt

NIST (National Institute of Standards & Technology) has come up with an AI Framework – still a work in progress, but it is coming into shape with this 1.0 version.…

Artificial Intelligence securitycompliance SecurityThreats

GenAI and Cybersecurity

June 19, 2024 zafirt

What does GenAi and Cybersecurity have in common? SCMagazine has the story: Gartner Security Summit: “3 takeaways” “Generative AI (GenAI) has emerged as a game-changer in the cybersecurity industry, offering…

ITSecurity Training SecurityThreats

What Are Some New Phishing Attacks?

June 13, 2024 zafirt

Every day and month in this new year (2024) the hackers of the criminal kind are working on new attacks to steal/take our resources and money. At SecureWorld yesterday there…

computersecuritynews securitycompliance Securityexploits

3 WordPress Plugins Have Bugs & Cause Cyber Incidents?

June 4, 2024 zafirt

Another Article (SCMagazine) with more bugs that can cause cybersecurity incidents – WordPress Plugins WPMeta SEO, WPStatistics, and LiteSpeed Cache. So as usual – if you have these plugins, check…

China computersecuritynews SecurityThreats

BianLian is Changing Ransomware Group

May 31, 2024 zafirt

BianLian is a Face Changing Chinese Opera, but it also appliess to a ransomware group that changes it’s attacks up a bit. Palo Alto Unit42 has a report: Unit 42…

computersecuritynews ITSecurity Training securitycommunity

You Moved Your Stuff to the “Cloud”, What Could Go Wrong?

May 20, 2024 zafirt

ArsTechnica has the story: “Unprecedented” Google Cloud event wipes out customer account and its backups The $135 billion pension account UniSuper (in Australia) which has 647,000 members thought it was…

China computersecuritynews SecurityThreats

Need a remote work Programmer? Watch out for North Koreans looking for work

May 17, 2024 zafirt

There is an indictment of a woman in Arizona (which made $6.8million) as a proxy between North Korean soldiers and unsuspecting numbers of people’s identities. From Justice.gov indictment form: According…

computersecuritynews Securityexploits SecurityThreats

Meaning of 49million Dell Information Hacked

May 15, 2024 zafirt

Yes Dell API(Application Programming Interface) was hacked to the tune of 49 million customer records. (BleepingComputer article) What does that mean? Fortunately the data did not have financial data, only…

China computersecuritynews SecurityThreats

Xiaomi Devices Have Cybersecurity Event

May 7, 2024 zafirt

What is a Xiaomi device? It is a mobile phone made in China of course. At iide.co (a Colombia website) A digital marketing course does a SWOT(Strength Weakness Opportunities Threats)…

oversitesentryapproved securitycommunity

May 1st – Happy New Month – Cybersecurity Important?

May 1, 2024 zafirt

Yes it is May 1st today – so I was wondering is Cybersecurity still a thing? Tip1 A good cybersecurity tip for May first is to update and strengthen your…

computersecuritynews ITSecurity Training oversitesentryapproved

51% of Survey Respondents Hacked- Means What?

April 24, 2024 zafirt

A survey by Pentera in a Hacker News Story says 51% of respondents said they were hacked. What does a statistic like that mean to you? Are you tired of…

Securitybreaches Securityexploits

Thousands WordPress Sites Hacked

April 10, 2024 zafirt

BleepingComputer has the story WordPress sites have been hacked and then when you visit the site the following image comes and asks you to click a button which then leads…

Artificial Intelligence computersecuritynews SecurityThreats

My AI Chatbot Got Hacked Now What?

March 14, 2024 zafirt

Horizon3 has a post discussing Nextchat open source chatbot… https://www.horizon3.ai/attack-research/attack-blogs/nextchat-an-ai-chatbot-that-lets-you-talk-to-anyone-you-want-to/ Here is an interesting sentence: “From our research, the most widely deployed standalone Gen AI chatbot is NextChat, a.k.a ChatGPT-Next-Web.…

ITSecurity Training oversitesentryapproved

Email Says Renewing Your Membership?

March 8, 2024 zafirt

Yes you must renew your membership says the email… Did I remember to pay it?? I thought it is on auto-renew?? Anyway This is what it looked like on my…

ITSecurity Training securitycommunity

Can We Stop Phishing Attacks?

March 4, 2024 zafirt

Is there anything that we can do that will completely stop all phishing attacks? Short answer is no. We can reduce them by trying to get ourselves off different lists,…

China computersecuritynews SecurityThreats

Chinese Cyberattacks: What Are They in 2024?

February 29, 2024 zafirt

Microsoft Typhoon story: “Living off the Land” The story starts: ‘The attack is carried out by Volt Typhoon, a state-sponsored actor based in China that typically focuses on espionage and…

computersecuritynews

Will China Use Cyber Attacks in 2024?

February 18, 2024 zafirt

Because it is an election year and because the sun is coming up over the horizon the latest FBI director is testifying in Washington to say China could (was and…

Artificial Intelligence computersecuritynews SecurityThreats

AI in 2024 What Will Happen?

January 3, 2024 zafirt

How should I know? All I do know is that there will be a lot of changes happening faster and faster. The above image is from a previous post that…

computersecuritynews Securityexploits SecurityThreats

Another Phishing Attack Angle

August 18, 2023 zafirt

Hackers have found ways to add notification code behind the website code. Thus if you say Allow in the notification window: then eventually a ‘bad’ notification comes up: Here is…

computersecuritynews Securitybreaches Securityexploits

Hackers Using New Attack (Not Just Ransomware)

July 1, 2023 zafirt

Here is the story from scmagazine: MOVEit hackers may have found simpler business model beyond ransomware “The Russian-speaking hacker group Cl0p confirmed it exploited a zero-day vulnerability in the popular…

computersecuritynews securitycompliance

Windows11 — Upgrade Soon?

June 6, 2023 zafirt

Windows10 arrived not that long ago… According to Microsoft’s site learn.microsoft.com 1507 was the first version and it had an initial release at 2015-07-29 so about 8 years ago it…

Artificial Intelligence computersecuritynews securitycommunity

Has ChatGPT Already Crossed the Red Line?

April 10, 2023 zafirt

OpenAI has breathlessly released the latest version (4.0) a few days ago. This version has plugins which will allow the program to connect with other programs to sort or otherwise…

computersecuritynews SecurityThreats

During War are we getting Attacked More?

February 1, 2023 zafirt

I am talking about the Russian war against Ukraine which started on Feb 2022. Do you have 80 computes, more than a dozen? Then it should be obvious that they…

computersecuritynews securitycommunity

Hacked? Got insurance? No Payout!!

January 7, 2023 zafirt

SCMagazine story on January 3rd. makes you think about the efficacy of cyber insurance. The problem is the government fines and some of the details in the contract language: “The…

computersecuritynews securitycommunity

2022 What Did we Learn in Cybersecurity?

December 30, 2022 zafirt

49 posts on this blogsite oversitesentry in 2022 There were many different posts I chose 4 to highlight in early ’22: What does Segmentation DonaldTrump Malware post Jan 25,22 Hackers…

computersecuritynews Securitybreaches Securityexploits

Password Managers Hacked: Passwordstate and Lastpass

December 27, 2022 zafirt

Passwordstate security failure was worse than Lastpass – but any entity can be hacked or have a cybersecurity failure. Looking into the specifics Passwordstate issue is discussed in portswigger website.…

ITSecurity Training securitycommunity

How Can a Small Business Prepare for Cyber Disaster?

December 20, 2022 zafirt

Let’s discuss what a cyber disaster is… a disaster in the cyber world would be losing the ability to run the apps and information that you want to run on…

computersecuritynews securitycommunity

Less Than 100 Employees: 3x More Likely Target

December 15, 2022 zafirt

At Technewsworld the following quote is interesting: “Attackers do not just target large enterprises. Recent reporting shows companies with less than 100 employees are three times more likely to be…

China computersecuritynews SecurityThreats

Every month New Vulnerabilities and Patches/Fixes

July 20, 2022 zafirt

A new Vulnerability which was a “Zero Day” vulnerability in a Windows Tool called MSDT (Microsoft Support Diagnostic Tool) according to Technewsworld.com story You can see the tool here in…

Posts pagination

1 2 … 196
Older Posts
Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Tags
CurrentNews HistoryInfo

Too Late You're Hacked Guide

Too Late You're Hacked Guide

$9.00Buy now

Categories
  • Artificial Intelligence
  • China
  • computersecuritynews
  • CyberCrowd
  • cyberjokesFriday
  • hackermovies
  • ITSecurity Training
  • oversitesentryapproved
  • Securitybreaches
  • securitycommunity
  • securitycompliance
  • Securityexploits
  • SecurityThreats
  • Uncategorized
Recent
  • Make Unlimited Amount of Money$$$ Using AI!!
  • AI Being Used in Your Company? Good and Bad!!!
  • Need to reduce gmail storage?
  • AI Has to Be Used Correctly
  • Security Policy – What is it good for?
  • Google Gemini is a Hacker’s Dream
  • New Year Same Problems – Hackers Try to Get Clicks
  • If We Do Use AI How Should Small Business do that?
  • Create Guardrails for Company AI usage
  • AI browsers Security Called Into Question – Make it secure after breach?

You missed

Artificial Intelligence computersecuritynews cyberjokesFriday

Make Unlimited Amount of Money$$$ Using AI!!

March 20, 2026 zafirt
China computersecuritynews Securityexploits

AI Being Used in Your Company? Good and Bad!!!

March 13, 2026 zafirt
computersecuritynews ITSecurity Training

Need to reduce gmail storage?

February 26, 2026 zafirt
computersecuritynews

AI Has to Be Used Correctly

February 9, 2026 zafirt

Oversitesentry Cyber

Defend Your Systems

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About
  • All It Takes Is One Weak Computer
  • Book Email List
  • Cart
  • Checkout
  • Contact
  • Contact Us
  • CyberCrowd- to help solve Psychology of Security
  • Cybersecurity Overview
  • Home
  • My account
  • Order Book
  • OversiteSentry Blog page
  • Returns
  • Returns
  • Secure computing solution
  • Shop
  • Small Business PCI Compliance
  • Top30 Security Links to Review
 

Loading Comments...