The GitLoker hacking group, known for hijacking GitHub repositories and extorting developers, has taken its operations to the next level with a new phishing tool called Goissue. Marketed as the “premier solution for efficiently extracting GitHub users and their...
Welcome to Cyber Safe Resources
Welcome! You’ll find simple, practical resources to help you build safer online habits. We update articles regularly. Be part of our community—subscribe to the newsletter to stay informed and empowered.
Exploitation Attempts Target Two Recently Patched Citrix Session Recording Vulnerabilities
Cybersecurity researchers have reported exploitation attempts targeting two recently patched vulnerabilities in Citrix Session Recording. These vulnerabilities, identified as CVE-2024-8068 and CVE-2024-8069, were disclosed by cybersecurity firm WatchTowr, which...
Cyberattack Disrupts Gambling Giant IGT: What Businesses Can Learn
What would you do if your business’s IT systems were suddenly taken offline? That’s the reality International Game Technology (IGT), a global leader in gambling and lottery solutions, is facing after falling victim to a cyberattack.What Happened?On November 17, IGT...
How Microsoft Took Down a Major Phishing Operation—and What It Means for Your Business
Did you know that phishing kits are being sold for as little as $150 a month, enabling cybercriminals to launch large-scale attacks against businesses like yours?Microsoft recently took decisive action against a prominent phishing-as-a-service (PaaS) operation known...
145,000+ Internet-Exposed Industrial Control Systems: A Growing Cybersecurity Concern
Industrial control systems (ICS) are critical to infrastructure, yet over 145,000 ICS devices are exposed to the internet globally, according to a recent report by internet intelligence firm Censys. Spread across 175 countries, 38% of these devices are in North...
Microsoft’s New Tools to Help Businesses Recover Faster from IT Crises
Microsoft’s New Tools to Help Businesses Recover Faster from IT CrisesWhat do you do when your business’s computers suddenly crash, bringing work to a screeching halt? IT crises like these can cost businesses time, money, and productivity. Last year, millions of...
Cybersecurity Myths Debunked
In the rapidly evolving world of cybersecurity, misconceptions can lead to ineffective defenses and heightened risks. Let’s debunk some of the most common cybersecurity myths that might be putting your small business at risk:Myth 1: Small Businesses Aren't Targets for...
The Importance of a Mobile Device Security Policy
In our increasingly mobile world, smartphones and tablets are indispensable tools for business operations, especially in small businesses where flexibility and responsiveness are keys to success. However, the convenience of mobile devices also brings significant...
Is Your Home Office a Gateway for Cybercriminals? Here’s What You Need to Know
As remote work continues to shape the modern workplace, are you sure your home office is as secure as it should be? The rapid shift to remote work, spurred by the COVID-19 pandemic, has become a permanent fixture for many businesses. But with this new normal comes a...
Implementing a Secure Wi-Fi Protocol for Small Businesses
Does your small business rely on Wi-Fi for daily operations? If so, ensuring your Wi-Fi network is secure is crucial to protect your data and systems from cyber threats. A secure Wi-Fi protocol not only guards against unauthorized access but also ensures that...
Spotting and Responding to Insider Threats
Do you know how vulnerable your business is to insider threats? Insider threats, involving employees or contractors misusing their access to harm the company, can be as damaging as attacks from external cybercriminals. Understanding how to spot and respond to these...
Using Cloud Storage Safely: Tips for Small Businesses
As small businesses increasingly turn to cloud storage for its cost-effectiveness and scalability, understanding how to use these services safely is crucial. The convenience of cloud storage can be a double-edged sword if not managed correctly, potentially exposing...











