Author Archives: alfredfustakgi

CyberSecure Solutions Security Bulletin (August 7, 2019)

Overview Phish Tale of the Week Cyber Attacks on the Rise US Utilities Have Become Targets How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week For this week’s Phish Tale of the Week, we’re taking a look at the phishing email that was sent to our HQ office that claims to be a promotional […]
Read More »

CyberSecure Solutions Security Bulletin (July 24, 2019)

Overview Phish Tale of the Week Sprint Breach Exposes Customer Data Critical Flaw Found In VLC Media Player How Can Netizen/CyberSecure Solutions help?  Phish Tale of the Week As is typical for most businesses, our HQ Office inbox receives the occasional phishing email attempting to trick an employee into sending the perpetrator some sort of […]
Read More »

Netizen Cybersecurity Bulletin (July 10, 2019)

Overview Phish Tale of the Week Microsoft’s BlueKeep Proves Vulnerable Critical Warning Issued for Samsung Cellphone Update App How Can Netizen Help? Phish Tale of the Week Phishing attempts are often carried out with urgent messages that are meant to provoke the victim to act without rationally thinking about the contents of the email. In […]
Read More »

Netizen Cybersecurity Bulletin (June 26, 2019)

Overview Phish Tale of the Week Vulnerability in TP-Link’s Wi-Fi Extenders Could Allow Remote Control to Attackers Latest Phishing Scam Impersonates Apple Support How Can Netizen Help? Phish Tale of the Week Phishing attempts can often target specific groups that can be exploited by malicious actors. In this instance, we see a phishing email targeting […]
Read More »

NETIZEN AWARDED $845,000 U.S. ARMY CYBER SECURITY ENGINEERING CONTRACT

Allentown, PA: Netizen Corporation, an ISO 27001:2013 certified provider of cyber security and related solutions for defense, government and commercial markets, was awarded an $845,000 contract with the U.S. Army supporting the Project Manager Training Devices (PM TRADE) organization in Orlando, Florida. The work under the contract, which began on May 31st, includes Cyber Security […]
Read More »

Netizen Cybersecurity Bulletin (12 June 2019)

Overview Phish Tale of the Week Microsoft Urges Users to Patch BlueKeep Security Flaw U.S. Customs and Border Protection Data Breach How Can Netizen Help? Phish Tale of the Week Malicious actors are constantly finding new ways to target a big payday. In the newest trend, these cyber criminals are using secured websites to run […]
Read More »

Netizen Cybersecurity Bulletin (29 MAY 2019)

Overview Phish Tale of the Week First American Financial Corp. Leaks 800+ Million Records Google Begins Tracking “zero-day” Exploits How Can Netizen Help? Phish Tale of the Week One way a malicious actor can try to collect a business’ sensitive information is by targeting the business’ employees. Attempting to phish an employee requires some research […]
Read More »

Netizen Cybersecurity Bulletin (15 MAY 2019)

Overview Phish Tale of the Week Ransomware Attacks Hit Baltimore City Servers Hospitals Demanding Better Cybersecurity from Device Makers How Can Netizen Help? Phish Tale of the Week Malicious actors are often attempting to find an unassuming victim to target with the goals of persuading them to provide log-in credentials or download malware. Some of […]
Read More »

Netizen Corporation Cybersecurity Bulletin (May 1st, 2019)

Overview Phish Tale of the Week Microsoft Reveals Email Services Hack Cleveland Hopkins International Airport Attacked by Ransomware How Can Netizen Help? Phish Tale of the Week People always assume they can spot a malicious email because they’ve seen them before.  And to a point, that’s true. However, the malcontents who send them are always […]
Read More »

Netizen Corporation Cybersecurity Bulletin (April 17th, 2019)

Overview Phish Tale of the Week Security Flaws in Enterprise VPN Apps WPA3 Security Vulnerabilities Discovered How Can Netizen Help? Phish Tale of the Week Phishing attacks are attempts by a hacker, masquerading as a trusted person or entity, to steal vital information such as login credentials, credit card information, or personal information by persuading […]
Read More »