2 Robert Speck Parkway, Suite 298 Mississauga ON
+1 888 366 4443
info@gige.ca

Tag: gige it solutions

IT Services & IT Solutions Mississauga & Toronto

cathay pacific cyberattack

Lessons Learned From The Cathay Pacific Data Breach

Hong Kong airline company Cathay Pacific was fined 500 000 pounds by the UK Information Commissioner’s office due to a data leak where 9.4 million user records were leaked. Of the affected individuals, over 100 000 were from the UK. The data breach was the result of unauthorized access to Cathay Pacific’s servers that dated…
Read more

resort

10.6 Million Customer Records Leaked by MGM Resorts

Over 10.6 million customer data records were leaked by the MGM Resorts Hotel in a recent data breach. Information that was leaked to the public included customer addresses, phone numbers, birthdays, and email addresses. The information was posted publicly on a hacking forum. In the post-leak security audit, MGM discovered that the breach was caused…
Read more

ssh keys

SSH Key Malware Is Spreading

What are SSH Keys? SSH, or Secure Shell, is a method used to establish a secure login between two systems. It is widely used across many operating systems. Using an SSH key, an IT administrators can gain access to servers and computers. Because SSH keys do not expire, and unauthorized individual in possession of and…
Read more

netherlands university clop ransomware

Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption

Netherlands’ Maastricht University was hit by a ransomware attack on December 23rd, 2019. The university paid the cyberattackers 30 bitcoins, worth at around $220 000 USD, in order to restore the infected computers to working conditions. The ransomware malware strain, called “Clop ransomware”, encrypted 267 of the university’s Windows servers, including backups. The University’s full…
Read more

insurance company calculator

Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack

On October 8th 2019, an unnamed Canadian insurance company paid a total of 950 000 USD to a ransomware cyberattacker. The attacker was able to infect 20 servers and around 1000 employee computers in the attack, encrypting data on the systems behind a ransomwall, demanding payment of 109.25 bitcoins for the safe release of the…
Read more
cloud security 2020 cybersecurity focus

Cloud Security Will Be The Cybersecurity Topic Of 2020

Cloud computing grew drastically in 2019. However, cloud security has dragged behind in development which has resulted in some of the most devastating cyberattacks in history. In traditional offline computing, programs and data are stored locally on a machine. On the organizational scale, data may be stored and shared on local servers that are linked…
Read more
ransomware in 2020 cybersecurity landscape new year

Ransomware In 2020 Will Be More Vicious Than Ever

With 2019 drawing to a close and 2020 almost here, we can take a look sat how the cybersecurity landscape has evolved over this past year. By far the two most prevalent topics of the year have been ransomware and data privacy. Ransomware By far the most relevant cybersecurity threat of 2019 was the rise…
Read more
ransomware new strategy release stolen data

Ransomware Cyberattackers Now Releasing Stolen Data To The Public

Cyberattackers using ransomware for money extortion have recently adopted a new strategy to force victims into succumbing to their threats – releasing sensitive stolen information to the public. This new strategy was brought to light by a recent cyberattack by the Maze Ransomware strain. Typically, ransomware cyberattacks force victims to pay ransom fees by locking…
Read more
new virtual private network vulnerabilities

Newly Discovered Vulnerabilities Raise Concern over Security of VPN

VPNs, or Virtual Private Networks, is a secure connection between computers over the internet. It allows for data to be transferred among computers in a more secure environment than over a public network. Alex Seymour, a cybersecurity researcher at Immersive Labs, recently discovered two new VPN vulnerabilities in Aviatrix VPN: a VPN service used by…
Read more

How The Dexphot Malware Evolves To Avoid Detection

Dexphot is a malware that has raised concern over its complex strategy of avoiding detection. First detected in October 2018, Dexphot is a strain cryptojacking malware. Cryptojacking malware is defined by its main goal of secretly hijacking computer resources in order to generate digital currencies for the cyberattacker. The victim’s computer suffers slowdowns, and is…
Read more