Cybersecurity

Ransomware

Nonprofits: What to Do After a Cyberattack — And How to Prevent the Next One

Nonprofits are under attack—literally.  Organizational leadership continues to instruct IT teams to do more with less.  Lean IT teams are getting pounded with the operational day-to-day and with one fire drill after the next, the most important security initiatives around Zero Trust, SASE, Network Access Control (NAC) and Identity Access Management (IAM) get sidelined, leaving […]

Nonprofits: What to Do After a Cyberattack — And How to Prevent the Next One Read More »

Woman in tech, illuminated by blue data light, focused on advanced cybersecurity systems, Generative AI

The Biggest Cybersecurity Challenges of 2025: What You Need to Know

As cyber threats continue to evolve, 2025 is proving to be a critical year for cybersecurity professionals, organizations, and governments alike. From AI-driven attacks to state-sponsored cyber espionage, organizations must stay vigilant to protect their data, infrastructure, and digital assets. In this blog post, we will break down the most pressing cybersecurity issues of today

The Biggest Cybersecurity Challenges of 2025: What You Need to Know Read More »

Sniper Watch: Stop, Call, Wait

Is Your Business Prepared for a Cyber Incident?

Is Your Business Prepared for a Cyber Incident?   In today’s digital age, having a well-written Incident Response plan is not optional, it’s essential. Yet many companies find themselves unprepared when disaster strikes. We recommend these immediate actions for managing unexpected cybersecurity incidents: Stop, Call, Wait. . Stop: Don’t panic.  Halt all operations safely and

Is Your Business Prepared for a Cyber Incident? Read More »

SEC

U.S. Securities & Exchange Commission (SEC) Adopts New Cybersecurity Disclosure Rules

History The Securities and Exchange Commission (SEC) first proposed new cybersecurity disclosure rules on March 8, 2022.  The comment period for the proposed rules closed on May 9, 2022.  The SEC then reopened the comment period on the proposed rules on February 9, 2023, and closed it on April 11, 2023.  Public company directors and

U.S. Securities & Exchange Commission (SEC) Adopts New Cybersecurity Disclosure Rules Read More »

iPhone-Android_Device

Does Turning Your Smartphone (iPhone|Android) Off Protect You From Malware?

We’ve had folks contact us telling us that they’ve solved the cybersecurity problem. They’ve told us that they’ll just shut off their phone when not in use… “What!?!” Would you shut off your smart pacemaker?!? 🤪 Communication devices are meant to do just that… communicate! Malware comes in all shapes and sizes, and can range

Does Turning Your Smartphone (iPhone|Android) Off Protect You From Malware? Read More »

Why Do I Need Multifactor Authentication (MFA)?

🔒 Protecting your online presence is crucial in today’s digital world! As cybersecurity experts, we highly recommend using Multifactor Authentication (MFA) to enhance the security of your accounts. MFA adds an extra layer of protection by requiring multiple forms of verification before granting access. It’s like having a virtual bodyguard for your digital identity! 💂‍♂️💻

Why Do I Need Multifactor Authentication (MFA)? Read More »

CPA Firms - Cybersecurity

Top Business & Cybersecurity Concerns for CPAs in 2023

Cybersecurity Impact on CPA Firms Cybersecurity is a critical issue for businesses and organizations of all sizes and industries, and the accounting profession is no exception. In today’s digital age, sensitive financial data and information are increasingly at risk of being compromised by cybercriminals who seek to steal valuable data, commit fraud, or cause disruption

Top Business & Cybersecurity Concerns for CPAs in 2023 Read More »

How CPA Firms can protect against a cyber attack

How CPA Firms Can Protect Against Cyber Attacks During the Busy Tax Season Within The Next 14 Days

As a CPA owner, it’s crucial to understand the importance of cybersecurity for your business. Cybersecurity is the practice of protecting your computer systems, networks, and sensitive information from unauthorized access, theft, and damage. With the increase in cyber attacks, businesses of all sizes are at risk. In fact, according to a report by Verizon,

How CPA Firms Can Protect Against Cyber Attacks During the Busy Tax Season Within The Next 14 Days Read More »

Hackers Create ChatGPT-Driven Telegram Bots That Can Write Malware

Cyber-criminals are using Microsoft-owned ChatGPT to create Telegram bots that can write malware and steal your data, new research has revealed. Currently, if you ask ChatGPT to write a phishing email impersonating a bank or create malware, it will not generate it.  However, hackers are working their way around ChatGPT’s restrictions and there is an

Hackers Create ChatGPT-Driven Telegram Bots That Can Write Malware Read More »

Hacker uses new ‘Screenshotter’ malware tool to target organizations

A new hacker identified as TA886 targets organizations in the US and Germany with the new custom malware tool “Screenshotter” to perform surveillance and data theft on infected systems. According to BleepingComputer, the previously unknown cluster of activity was first discovered by the US-based security firm Proofpoint in October 2022.  The hacker appears to be

Hacker uses new ‘Screenshotter’ malware tool to target organizations Read More »

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack

Hackers believed to work for Russia have started using a new code execution technique that relies on mouse movement in Microsoft PowerPoint presentations to trigger a malicious PowerShell script. No malicious macro is necessary for the malicious code to execute and download the payload, for a more insidious attack.  A report from threat intelligence company

Hackers Use Powerpoint (.PPT) files for Triggered ‘MouseOver’ Malware Delivery Attack Read More »

Top Cybersecurity Breaches - 2021

2021: Top Cybersecurity Data Breaches – The Year in Review

*Alert*: Sniper Watch C3 – Inadequate cybersecurity posture continues to be a major leading cause to continued data breaches, disruption, and dismantling of corporate operations. In 2021, thousands of new cybersecurity incidents have been recorded and cyberattacks are continuing to rise.  Cybersecurity insurance premiums are skyrocketing and most organizations are not properly protected from these

2021: Top Cybersecurity Data Breaches – The Year in Review Read More »

Happy Labor Day - Maintain High Alert of Cyberattacks to Emerge

Happy Labor Day: Maintain High Alert of Cyberattacks to Emerge

Sniper Watch and the Cybersecurity & Infrastructure Security Agency (CISA) warns businesses of all sizes to be mindful of risky behaviors that leave networks exposed to cyberattacks – and should be addressed immediately! Summary: Unsupported Software & Applications Single-Factor Authentication – Credential Theft End of Life | End of Support Software Using unsupported software, allowing

Happy Labor Day: Maintain High Alert of Cyberattacks to Emerge Read More »

Biometrics Mandates Enforced

New York City Enacts Biometrics Law for Food & Drink Establishments, Entertainment Venues, and Retail Stores

New York City’s Biometric Identifier Information Law goes into effect on July 9. The law applies to food and drink establishments, places of entertainment, and retail stores in New York City that collect, retain, convert, store, or share biometric identifier information (e.g., retina or iris scans, fingerprints, voiceprints, and hand scans) from customers. According to the

New York City Enacts Biometrics Law for Food & Drink Establishments, Entertainment Venues, and Retail Stores Read More »

COVID-19 Hacker attacks Work from Home Users

Cyberattacks now seen at Unprecedented Scale as Teleworkers Increase in Massive Numbers

As recent events have now shaped the culture of our business and personal life, we are now entering a new phase of the aftershock of the COVID-19 pandemic.  Chaos, survival mode, quarantining, shifted focus, uncertainty, mass layoffs, financial disruption, and large companies now declaring bankruptcy have resulted in businesses and individuals shifting their attention to

Cyberattacks now seen at Unprecedented Scale as Teleworkers Increase in Massive Numbers Read More »

Fake Veterans Hiring Website

FAKE VETERAN HIRING WEBSITE

We’ve discovered a threat actor attempting to take advantage of Americans who may be seeking a job, especially military veterans. The actor, previously identified by Symantec as Tortoiseshell, deployed a website called hxxp://hiremilitaryheroes[.]com that posed as a website to help U.S. military veterans find jobs. The URL is strikingly close to the legitimate service from

FAKE VETERAN HIRING WEBSITE Read More »

Google found a way to remotely attack Apple iOS devices by sending a boobytrapped iMessage

Details weren’t shared at the time, but we now know that the iOS security update addressed critical vulnerabilities discovered by Google security researchers Samuel Groß and Natalie Silvanovich that could allow a remote attacker to attack an iPhone just by sending a maliciously-crafted iMessage. Thankfully the vulnerabilities, which could most likely have been sold to

Google found a way to remotely attack Apple iOS devices by sending a boobytrapped iMessage Read More »

Operating Systems

More Than Half of SMB Devices Run Outdated Operating Systems

66% of devices in small-to midsized businesses are based on expired or about-to-expire Microsoft OS versions, Alert Logic study found. New research underscores security weaknesses in small-to midsized businesses including a dependence on antiquated Microsoft operating systems, encryption misconfigurations, poor patching regimes, and reliance on outdated Exchange 2000 email servers. The findings, published this week

More Than Half of SMB Devices Run Outdated Operating Systems Read More »

Scroll to Top