Hackers Attack with Phishing to Small Business

Searching in Grok for small business data on phishing stats “What is phishing attack statistics for small businesses”   Grok searched 15 websites and came up with this: Phishing attacks are a significant threat to small businesses, often targeting them due to their potentially limited resources for cybersecurity. Based on the most recent data available to … Read more

15k Fortinet Configurations Leaked-Microsoft 365 Accounts Targeted with Phishing Kit

2 interesting issues have been uncovered by  cybersecurity researchers. Hackernews article:   “New ‘Sneaky 2FA’ Phishing Kit Targets Microsoft 365 Accounts with 2FA Code Bypass” Phishing campaigns have been observed sending payment receipt-related emails to entice recipients into opening bogus PDF documents containing QR code that, upon scanning, redirects them to Sneaky 2FA pages. The Phishing … Read more

WordPress, Magento, and Opencart new vulnerability

Hackernews has the story  “New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites” from last year, and this morning it is https://thehackernews.com/2025/01/wordpress-skimmers-evade-detection-by.html. There are distinct similarities (WordPress Ecommerce and hackers try to steal CC #s online) It is an issue as the malware hides itself and can stay at the website to steal credit … Read more

HIPAA Rules Upgrade What it Means?

There is a new “rulemaking” that is trying to get the process started for updated HIPAA regulations. At the federalregister.gov First we have to review as to how we got here: Regulatory History 1.1996 Congress enacted HIPAA (Health Insurance Public Accountability Act) 2. 1998 Security Rule Notice of Proposed Rulemaking 3. 2003 Final Rule 4. … Read more

10 cybersecurity Items for 2025

Cybersecurity Focus Areas for Small Businesses in 2025 As we approach the new year, small businesses should prioritize their cybersecurity strategies to protect against evolving threats. Here are 10 essential items to work on for 2025: 1. Implement Strong Password Policies Establish robust password requirements for all employees. This includes using complex passwords and changing … Read more