Stamford, White Plains, Syracuse | Absolute Logic
 

Blog

Bitwarden’s Iframe Flaw Explained

The purpose of password managers is to safeguard our login credentials and online accounts. However, a popular password manager recently made headlines for its major security flaw. Bitwarden is under scrutiny because ...

Everything to Know About Essendant’s Multi-Day Outage

Essendant, a Staples-owned wholesale distributor of office supplies and stationery, paused its operations recently because of a multi-day, network-wide outage. The system disruption has prevented customers from placing orders online or contacting ...

Microsoft Patch Tuesday

Microsoft released on March 14, 2023, a security update that fixes at least 74 bugs in Windows and other software. Hackers are already attacking two flaws, including a very serious one in ...

How Secure is Your Favorite Social Media App?

Introduction We all use social media. The platform we prefer might differ, but 59% of the people around the globe have some form of it. Chances are, you do ...

AT&T Data Breach – 9 Million Affected

In a recent statement, telecommunications giant AT&T confirmed that a hack on a vendor it was working with exposed around 9 million accounts. AT&T said that the sensitive information was mainly about ...

Hiatus Malware Targets Business Routers

There is a new malware campaign targeting business-grade routers. It is called Hiatus, a complex operation that deploys the HiatusRAT malware. It is a kind of Remote Access Trojan (RAT) that cybercriminals ...

Cerebral Data Breach – 3.18 Million Affected

Cerebral, an online platform that offers mental health care services, recently suffered a data breach that may have affected up to 3.18 million users. According to its report, the breach was due ...

Don’t Bother the Bees: Honeypots and How to Avoid Them

Introduction You may have heard the term “honeypot” from your managed service provider before, but what does the term really mean? In cybersecurity, honeypots prevent attacks by providing a ...

Reduce the Risk of Business Email Compromise Attacks

Email threats have been around since the early 90s. But phishing techniques are much more sophisticated now than they were back then. One of the most successful and lucrative tactics is business ...

Maintain Customer Trust By Scaling Up IT Systems

Every business owner knows that forming a strong relationship with customers is essential to succeed. And two important elements of this relationship are positive customer experience and customer trust. Having these will ...

Contact

Absolute LogicAbsolute Logic Logo $$$