<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Alerts

Quick Guide to Tax and Unemployment Fraud

Data breaches and subsequent identity theft are unfortunate but common occurrences today and have only increased since the onset of the pandemic.

Heightened Cybersecurity Awareness: Russia-Ukraine Conflict

As the eyes of the world remain focused on the escalating conflict between Russia and Ukraine, cyberattacks are top of mind for professionals in the security sector, including the experts here at Ascend Technologies.

Attackers use fake Windows 11 Upgrade to Spread Malware

Researchers at HP released a new article today warning of a new scam that attackers use to spread the RedLine family of malware. This scam tricks users into downloading a fake Windows 11 upgrade package that secretly installs the malware onto the user’s computer. This is ...

PayPal Fraud - What You Need to Know About the New PayPal Phishing Scam

Unfortunately, we’re back with another phishing scheme that’s making its way through your inboxes and phones.

Over 18,000 Infected from SolarWinds Data Breach – What Happened?

This month, it was discovered that SolarWinds, a national IT software and infrastructure company, suffered a devastating data breach. By using a Trojan horse system, cybercriminals were able to infect more than 18,000 companies. While this plot was uncovered in December, in ...

SolarWinds Breach Updates | Ascend Technologies

As news of the SolarWinds Orion security breach continues to develop, the Ascend Technologies security team is closely monitoring updates and evaluating the impact on organizations like yours. This feed will be updated frequently with breaking news and expert insights ...

Alert: Malware Campaign Targeting US-Based Organizations

As a new wave of malware-focused phishing attacks gain popularity, our expert security engineers are on the frontlines. Here's what you need to know.

Scam Alert: Coupon Scams Target Users Spending More Time Online

Share link, get coupon? Not so fast.

Cyber Ranger's Handbook: Next Steps to Securing Your Home Base

There was a time, years ago, when I wasn’t just the highly capable security practitioner you see before you. I was also a Soldier. I wore a uniform for 22 years altogether, most of the time as an Infantryman in my state’s National Guard.

Work-from-Home Security: The Unspoken Cyber Impact of Coronavirus

Is your organization prepared to work from home due to the pandemic? Not just prepared for the change, but structurally prepared? Is your network designed to protect against the risks? For offices around the world, the possibility of having to send employees home ...

Complying with the SHIELD Act: Cybersecurity Requirements for Businesses

New York's SHIELD Act applies to businesses nationwide, with compliance required for anyone who does business with or holds personally identifiable information (PII) of New York residents. The following are key takeaways regarding SHIELD Act compliance.

Cyber-Warfare May Be On The Horizon — What It Means for the U.S.

According to a U.S. Department of Homeland Security (DHS) warning issued January 4, 2020, the government is preparing for the potential of Iran-sponsored cyberattacks following the January 3rd airstrike which killed Iranian commander Qasem Soleimani.

Staying Secure: Cyber-Conscious Tips for Your Holiday Season

Black Friday, Cyber Monday, holiday gifts and New Year's celebrations – these are some of the factors that make November through January the most active online-shopping period of the year.

BlueKeep & Seven Monkeys: Protecting Your Organization Against RDP Vulnerabilities

Leaving your remote desktop protocol (port 3389) servers open to the internet has been known to be a cybersecurity “bad idea” for years, but the Bluekeep vulnerability, as well as the more recent Seven Monkeys batch of disclosed vulnerabilities, have made this vital to your ...

Business Email Compromise: What is it, and How Can it Affect Me?

You may have heard the statistic: 90% of breaches start with email. But you’re probably thinking, that won’t happen to me. You know the signs of a phishing email and you avoid emails that are clearly unsafe, so you’re not going to be the one who gets breached, right?